ExamGecko
Home Home / Amazon / SCS-C01

Amazon SCS-C01 Practice Test - Questions Answers, Page 43

Question list
Search
Search

List of questions

Search

Related questions











Your company uses AWS to host its resources. They have the following requirements 1) Record all API calls and Transitions 2) Help in understanding what resources are there in the account 3) Facility to allow auditing credentials and logins Which services would suffice the above requirements Please select:

A.
AWS Inspector, CloudTrail, IAM Credential Reports
A.
AWS Inspector, CloudTrail, IAM Credential Reports
Answers
B.
CloudTrail. IAM Credential Reports, AWS SNS
B.
CloudTrail. IAM Credential Reports, AWS SNS
Answers
C.
CloudTrail, AWS Config, IAM Credential Reports
C.
CloudTrail, AWS Config, IAM Credential Reports
Answers
D.
AWS SQS, IAM Credential Reports, CloudTrail
D.
AWS SQS, IAM Credential Reports, CloudTrail
Answers
Suggested answer: C

Explanation:

You can use AWS CloudTrail to get a history of AWS API calls and related events for your account. This history includes calls made with the AWS Management Console, AWS Command Line Interface, AWS SDKs, and other AWS services. Options A,B and D are invalid because you need to ensure that you use the services of CloudTrail, AWS Config, IAM Credential Reports For more information on Cloudtrail, please visit the below URL: http://docs.aws.amazon.com/ awscloudtrail/latest/userguide/cloudtrail-user-guide.html AWS Config is a service that enables you to assess, audit and evaluate the configurations of your AWS resources. Config continuously monitors and records your AWS resource configurations and allows you to automate the evaluation of recorded configurations against desired configurations. With Config, you can review changes in configurations and relationships between AWS resources, dive into detailed resource configuration histories, and determine your overall compliance against the configurations specified in your internal guidelines. This enables you to simplify compliance auditing, security analysis, char management and operational troubleshooting.

For more information on the config service, please visit the below URL

https://aws.amazon.com/config/You can generate and download a credential report that lists all users in your account and the statusof their various credentials, including passwords, access keys, and MFA devices. You can get acredential report from the AWS Management Console, the AWS SDKs and Command Line Tools, orthe IAM API.

For more information on Credentials Report, please visit the below URL: http://docs.aws.amazon.com/IAM/latest/UserGuide/id credentials_getting-report.html The correct answer is: CloudTrail, AWS Config, IAM Credential Reports Submit your Feedback/Queries to our Experts

Your CTO is very worried about the security of your AWS account. How best can you prevent hackers from completely hijacking your account? Please select:

A.
Use short but complex password on the root account and any administrators.
A.
Use short but complex password on the root account and any administrators.
Answers
B.
Use AWS IAM Geo-Lock and disallow anyone from logging in except for in your city.
B.
Use AWS IAM Geo-Lock and disallow anyone from logging in except for in your city.
Answers
C.
Use MFA on all users and accounts, especially on the root account.
C.
Use MFA on all users and accounts, especially on the root account.
Answers
D.
Don't write down or remember the root account password after creating the AWS account.
D.
Don't write down or remember the root account password after creating the AWS account.
Answers
Suggested answer: C

Explanation:

Multi-factor authentication can add one more layer of security to your AWS account Even when you go to your Security Credentials dashboard one of the items is to enable MFA on your root account

Option A is invalid because you need to have a good password policy

Option B is invalid because there is no IAM Geo-Lock

Option D is invalid because this is not a recommended practices For more information on MFA, please visit the below URL http://docs.aws.amazon.com/IAM/latest/UserGuide/id credentials mfa.htmll

The correct answer is: Use MFA on all users and accounts, especially on the root account.

Submit your Feedback/Queries to our Experts

Your CTO thinks your AWS account was hacked. What is the only way to know for certain if there was unauthorized access and what they did, assuming your hackers are very sophisticated AWS engineers and doing everything they can to cover their tracks?

Please select:

A.
Use CloudTrail Log File Integrity Validation.
A.
Use CloudTrail Log File Integrity Validation.
Answers
B.
Use AWS Config SNS Subscriptions and process events in real time.
B.
Use AWS Config SNS Subscriptions and process events in real time.
Answers
C.
Use CloudTrail backed up to AWS S3 and Glacier.
C.
Use CloudTrail backed up to AWS S3 and Glacier.
Answers
D.
Use AWS Config Timeline forensics.
D.
Use AWS Config Timeline forensics.
Answers
Suggested answer: A

Explanation:

The AWS Documentation mentions the following

To determine whether a log file was modified, deleted, or unchanged after CloudTrail delivered it you can use CloudTrail log file integrity validation. This feature is built using industry standard algorithms:

SHA-256 for hashing and SHA-256 with RSA for digital signing. This makes it computationally infeasible to modify, delete or forge CloudTrail log files without detection. You can use the AWS CLI to validate the files in the location where CloudTrail delivered them Validated log files are invaluable in security and forensic investigations. For example, a validated log file enables you to assert positively that the log file itself has not changed, or that particular user credentials performed specific API activity. The CloudTrail log file integrity validation process also lets you know if a log file has been deleted or changed, or assert positively that no log files were delivered to your account during a given period of time. Options B.C and D is invalid because you need to check for log File Integrity Validation for cloudtrail logs For more information on Cloudtrail log file validation, please visit the below URL: http://docs.aws.amazon.com/awscloudtrail/latest/ userguide/cloudtrail-log-file-validation-intro.html The correct answer is: Use CloudTrail Log File Integrity Validation. omit your Feedback/Queries to our Expert

Your development team is using access keys to develop an application that has access to S3 and DynamoDB. A new security policy has outlined that the credentials should not be older than 2 months, and should be rotated. How can you achieve this?

Please select:

A.
Use the application to rotate the keys in every 2 months via the SDK
A.
Use the application to rotate the keys in every 2 months via the SDK
Answers
B.
Use a script to query the creation date of the keys. If older than 2 months, create new access key and update all applications to use it inactivate the old key and delete it.
B.
Use a script to query the creation date of the keys. If older than 2 months, create new access key and update all applications to use it inactivate the old key and delete it.
Answers
C.
Delete the user associated with the keys after every 2 months. Then recreate the user again.
C.
Delete the user associated with the keys after every 2 months. Then recreate the user again.
Answers
D.
Delete the IAM Role associated with the keys after every 2 months. Then recreate the IAM Role again.
D.
Delete the IAM Role associated with the keys after every 2 months. Then recreate the IAM Role again.
Answers
Suggested answer: B

Explanation:

One can use the CLI command list-access-keys to get the access keys. This command also returns the "CreateDate" of the keys. If the CreateDate is older than 2 months, then the keys can be deleted. The Returns list-access-keys CLI command returns information about the access key IDs associated with the specified IAM user. If there are none, the action returns an empty list Option A is incorrect because you might as use a script for such maintenance activities Option C is incorrect because you would not rotate the users themselves Option D is incorrect because you don't use IAM roles for such a purpose For more information on the CLI command, please refer to the below Link: http://docs.aws.amazon.com/cli/latest/reference/iam/list-access-keys.htmll The correct answer is: Use a script to query the creation date of the keys. If older than 2 months, create new access key and update all applications to use it inactivate the old key and delete it.

Submit your Feedback/Queries to our Experts

You work at a company that makes use of AWS resources. One of the key security policies is to ensure that all data i encrypted both at rest and in transit. Which of the following is one of the right ways to implement this. Please select:

A.
Use S3 SSE and use SSL for data in transit
A.
Use S3 SSE and use SSL for data in transit
Answers
B.
SSL termination on the ELB
B.
SSL termination on the ELB
Answers
C.
Enabling Proxy Protocol
C.
Enabling Proxy Protocol
Answers
D.
Enabling sticky sessions on your load balancer
D.
Enabling sticky sessions on your load balancer
Answers
Suggested answer: A

Explanation:

By disabling SSL termination, you are leaving an unsecure connection from the ELB to the back end instances. Hence this means that part of the data transit is not being encrypted. Option B is incorrect because this would not guarantee complete encryption of data in transit Option C and D are incorrect because these would not guarantee encryption For more information on SSL Listeners for your load balancer, please visit the below URL: http://docs.aws.amazon.com/elasticloadbalancine/latest/classic/elb-https-load-balancers.htmll The correct answer is: Use S3 SSE and use SSL for data in transit Submit your Feedback/Queries to our Experts

There are currently multiple applications hosted in a VPC. During monitoring it has been noticed that multiple port scans are coming in from a specific IP Address block. The internal security team has requested that all offending IP Addresses be denied for the next 24 hours. Which of the following is the best method to quickly and temporarily deny access from the specified IP Address's. Please select:

A.
Create an AD policy to modify the Windows Firewall settings on all hosts in the VPC to deny access from the IP Address block.
A.
Create an AD policy to modify the Windows Firewall settings on all hosts in the VPC to deny access from the IP Address block.
Answers
B.
Modify the Network ACLs associated with all public subnets in the VPC to deny access from the IP Address block.
B.
Modify the Network ACLs associated with all public subnets in the VPC to deny access from the IP Address block.
Answers
C.
Add a rule to all of the VPC Security Groups to deny access from the IP Address block.
C.
Add a rule to all of the VPC Security Groups to deny access from the IP Address block.
Answers
D.
Modify the Windows Firewall settings on all AMI'S that your organization uses in that VPC to deny access from the IP address block.
D.
Modify the Windows Firewall settings on all AMI'S that your organization uses in that VPC to deny access from the IP address block.
Answers
Suggested answer: B

Explanation:

NACL acts as a firewall at the subnet level of the VPC and we can deny the offending IP address block at the subnet level using NACL rules to block the incoming traffic to the VPC instances. Since NACL rules are applied as per the Rule numbers make sure that this rule number should take precedence over other rule numbers if there are any such rules that will allow traffic from these IP ranges. The lowest rule number has more precedence over a rule that has a higher number.

The AWS Documentation mentions the following as a best practices for IAM users For extra security, enable multi-factor authentication (MFA) for privileged IAM users (users who are allowed access to sensitive resources or APIs). With MFA, users have a device that generates a unique authentication code (a one-time password, or OTP). Users must provide both their normal credentials (like their user name and password) and the OTP. The MFA device can either be a special piece of hardware, or it can be a virtual device (for example, it can run in an app on a smartphone). Options C is invalid because these options are not available

Option D is invalid because there is not root access for users

For more information on IAM best practices, please visit the below URL:

https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.htmlThe correct answer is: Modify the Network ACLs associated with all public subnets in the VPC to denyaccess from the IP Address block.omit your Feedback/Queries to our Experts

A company has a set of EC2 Instances hosted in AWS. The EC2 Instances have EBS volumes which is used to store critical information. There is a business continuity requirement to ensure high availability for the EBS volumes. How can you achieve this?

A.
Use lifecycle policies for the EBS volumes
A.
Use lifecycle policies for the EBS volumes
Answers
B.
Use EBS Snapshots
B.
Use EBS Snapshots
Answers
C.
Use EBS volume replication
C.
Use EBS volume replication
Answers
D.
Use EBS volume encryption
D.
Use EBS volume encryption
Answers
Suggested answer: B

Explanation:

Data stored in Amazon EBS volumes is redundantly stored in multiple physical locations as part of normal operation of those services and at no additional charge. However, Amazon EBS replication is stored within the same availability zone, not across multiple zones; therefore, it is highly recommended that you conduct regular snapshots to Amazon S3 for long-term data durability Option A is invalid because there is no lifecycle policy for EBS volumes Option C is invalid because there is no EBS volume replication Option D is invalid because EBS volume encryption will not ensure business continuity For information on security for Compute Resources, please visit the below URL:

https://d1.awsstatic.com/whitepapers/Security/Security_Compute_Services_Whitepaper.pdf


A company is developing a highly resilient application to be hosted on multiple Amazon EC2 instances . The application will store highly sensitive user data in Amazon RDS tables The application must • Include migration to a different AWS Region in the application disaster recovery plan.

• Provide a full audit trail of encryption key administration events

• Allow only company administrators to administer keys.

• Protect data at rest using application layer encryption

A Security Engineer is evaluating options for encryption key management Why should the Security Engineer choose AWS CloudHSM over AWS KMS for encryption key management in this situation?

A.
The key administration event logging generated by CloudHSM is significantly more extensive than AWS KMS.
A.
The key administration event logging generated by CloudHSM is significantly more extensive than AWS KMS.
Answers
B.
CloudHSM ensures that only company support staff can administer encryption keys, whereas AWS KMS allows AWS staff to administer keys
B.
CloudHSM ensures that only company support staff can administer encryption keys, whereas AWS KMS allows AWS staff to administer keys
Answers
C.
The ciphertext produced by CloudHSM provides more robust protection against brute force decryption attacks than the ciphertext produced by AWS KMS
C.
The ciphertext produced by CloudHSM provides more robust protection against brute force decryption attacks than the ciphertext produced by AWS KMS
Answers
D.
CloudHSM provides the ability to copy keys to a different Region, whereas AWS KMS does not
D.
CloudHSM provides the ability to copy keys to a different Region, whereas AWS KMS does not
Answers
Suggested answer: B

A company has multiple Amazon S3 buckets encrypted with customer-managed CMKs Due to regulatory requirements the keys must be rotated every year. The company's Security Engineer has enabled automatic key rotation for the CMKs; however the company wants to verity that the rotation has occurred.

What should the Security Engineer do to accomplish this?

A.
Filter AWS CloudTrail logs for KeyRotaton events
A.
Filter AWS CloudTrail logs for KeyRotaton events
Answers
B.
Monitor Amazon CloudWatcn Events for any AWS KMS CMK rotation events
B.
Monitor Amazon CloudWatcn Events for any AWS KMS CMK rotation events
Answers
C.
Using the AWS CLI. run the aws kms gel-key-relation-status operation with the --key-id parameter to check the CMK rotation date
C.
Using the AWS CLI. run the aws kms gel-key-relation-status operation with the --key-id parameter to check the CMK rotation date
Answers
D.
Use Amazon Athena to query AWS CloudTrail logs saved in an S3 bucket to filter Generate New Key events
D.
Use Amazon Athena to query AWS CloudTrail logs saved in an S3 bucket to filter Generate New Key events
Answers
Suggested answer: C

A company needs a forensic-logging solution for hundreds of applications running in Docker on Amazon EC2 The solution must perform real-time analytics on the togs must support the replay of messages and must persist the logs. Which AWS services should be used to meet these requirements? (Select TWO)

A.
Amazon Athena
A.
Amazon Athena
Answers
B.
Amazon Kinesis
B.
Amazon Kinesis
Answers
C.
Amazon SQS
C.
Amazon SQS
Answers
D.
Amazon Elasticsearch
D.
Amazon Elasticsearch
Answers
E.
Amazon EMR
E.
Amazon EMR
Answers
Suggested answer: B, D
Total 590 questions
Go to page: of 59