ExamGecko
Home Home / Amazon / SCS-C01

Amazon SCS-C01 Practice Test - Questions Answers, Page 45

Question list
Search
Search

List of questions

Search

Related questions











A recent security audit found that AWS CloudTrail logs are insufficiently protected from tampering and unauthorized access Which actions must the Security Engineer take to address these audit findings? (Select THREE )

A.
Ensure CloudTrail log file validation is turned on
A.
Ensure CloudTrail log file validation is turned on
Answers
B.
Configure an S3 lifecycle rule to periodically archive CloudTrail logs into Glacier for long-term storage
B.
Configure an S3 lifecycle rule to periodically archive CloudTrail logs into Glacier for long-term storage
Answers
C.
Use an S3 bucket with tight access controls that exists m a separate account
C.
Use an S3 bucket with tight access controls that exists m a separate account
Answers
D.
Use Amazon Inspector to monitor the file integrity of CloudTrail log files.
D.
Use Amazon Inspector to monitor the file integrity of CloudTrail log files.
Answers
E.
Request a certificate through ACM and use a generated certificate private key to encrypt CloudTrail log files
E.
Request a certificate through ACM and use a generated certificate private key to encrypt CloudTrail log files
Answers
F.
Encrypt the CloudTrail log files with server-side encryption with AWS KMS-managed keys (SSEKMS)
F.
Encrypt the CloudTrail log files with server-side encryption with AWS KMS-managed keys (SSEKMS)
Answers
Suggested answer: A, D, E

A company's Security Auditor discovers that users are able to assume roles without using multifactor authentication (MFA). An example of a current policy being applied to these users is as follows:

The Security Auditor finds that the users who are able to assume roles without MFA are alt coming from the AWS CLI. These users are using long-term AWS credentials. Which changes should a Security Engineer implement to resolve this security issue? (Select TWO.)

A.
A.
Answers
B.
B.
Answers
C.
C.
Answers
D.
D.
Answers
E.
E.
Answers
Suggested answer: A, D

A company hosts multiple externally facing applications, each isolated in its own AWS account The company'B Security team has enabled AWS WAF. AWS Config. and Amazon GuardDuty on all accounts. The company's Operations team has also joined all of the accounts to AWS Organizations and established centralized logging for CloudTrail. AWS Config, and GuardDuty. The company wants the Security team to take a reactive remediation in one account, and automate implementing this remediation as proactive prevention in all the other accounts.

How should the Security team accomplish this?

A.
Update the AWS WAF rules in the affected account and use AWS Firewall Manager to push updated AWS WAF rules across all other accounts.
A.
Update the AWS WAF rules in the affected account and use AWS Firewall Manager to push updated AWS WAF rules across all other accounts.
Answers
B.
Use GuardDuty centralized logging and Amazon SNS to set up alerts to notify all application teams of security incidents.
B.
Use GuardDuty centralized logging and Amazon SNS to set up alerts to notify all application teams of security incidents.
Answers
C.
Use GuardDuty alerts to write an AWS Lambda function that updates all accounts by adding additional NACLs on the Amazon EC2 instances to block known malicious IP addresses.
C.
Use GuardDuty alerts to write an AWS Lambda function that updates all accounts by adding additional NACLs on the Amazon EC2 instances to block known malicious IP addresses.
Answers
D.
Use AWS Shield Advanced to identify threats in each individual account and then apply the account-based protections to all other accounts through Organizations.
D.
Use AWS Shield Advanced to identify threats in each individual account and then apply the account-based protections to all other accounts through Organizations.
Answers
Suggested answer: C

A company is using AWS Secrets Manager to store secrets for its production Amazon RDS database.

The Security Officer has asked that secrets be rotated every 3 months. Which solution would allow the company to securely rotate the secrets? (Select TWO.)

A.
Place the RDS instance in a public subnet and an AWS Lambda function outside the VPC. Schedule the Lambda function to run every 3 months to rotate the secrets.
A.
Place the RDS instance in a public subnet and an AWS Lambda function outside the VPC. Schedule the Lambda function to run every 3 months to rotate the secrets.
Answers
B.
Place the RDS instance in a private subnet and an AWS Lambda function inside the VPC in the private subnet. Configure the private subnet to use a NAT gateway. Schedule the Lambda function to run every 3 months to rotate the secrets.
B.
Place the RDS instance in a private subnet and an AWS Lambda function inside the VPC in the private subnet. Configure the private subnet to use a NAT gateway. Schedule the Lambda function to run every 3 months to rotate the secrets.
Answers
C.
Place the RDS instance in a private subnet and an AWS Lambda function outside the VPC.Configure the private subnet to use an internet gateway. Schedule the Lambda function to run every 3 months lo rotate the secrets.
C.
Place the RDS instance in a private subnet and an AWS Lambda function outside the VPC.Configure the private subnet to use an internet gateway. Schedule the Lambda function to run every 3 months lo rotate the secrets.
Answers
D.
Place the RDS instance in a private subnet and an AWS Lambda function inside the VPC in the private subnet. Schedule the Lambda function to run quarterly to rotate the secrets.
D.
Place the RDS instance in a private subnet and an AWS Lambda function inside the VPC in the private subnet. Schedule the Lambda function to run quarterly to rotate the secrets.
Answers
E.
Place the RDS instance in a private subnet and an AWS Lambda function inside the VPC in the private subnet. Configure a Secrets Manager interface endpoint. Schedule the Lambda function to run every 3 months to rotate the secrets.
E.
Place the RDS instance in a private subnet and an AWS Lambda function inside the VPC in the private subnet. Configure a Secrets Manager interface endpoint. Schedule the Lambda function to run every 3 months to rotate the secrets.
Answers
Suggested answer: B, E

A corporation is preparing to acquire several companies. A Security Engineer must design a solution to ensure that newly acquired AWS accounts follow the corporation's security best practices. The solution should monitor each Amazon S3 bucket for unrestricted public write access and use AWS managed services.

What should the Security Engineer do to meet these requirements?

A.
Configure Amazon Macie to continuously check the configuration of all S3 buckets.
A.
Configure Amazon Macie to continuously check the configuration of all S3 buckets.
Answers
B.
Enable AWS Config to check the configuration of each S3 bucket.
B.
Enable AWS Config to check the configuration of each S3 bucket.
Answers
C.
Set up AWS Systems Manager to monitor S3 bucket policies for public write access.
C.
Set up AWS Systems Manager to monitor S3 bucket policies for public write access.
Answers
D.
Configure an Amazon EC2 instance to have an IAM role and a cron job that checks the status of all S3 buckets.
D.
Configure an Amazon EC2 instance to have an IAM role and a cron job that checks the status of all S3 buckets.
Answers
Suggested answer: C

A Security Engineer is troubleshooting an issue with a company's custom logging application. The application logs are written to an Amazon S3 bucket with event notifications enabled to send events lo an Amazon SNS topic. All logs are encrypted at rest using an AWS KMS CMK. The SNS topic is subscribed to an encrypted Amazon SQS queue. The logging application polls the queue for new messages that contain metadata about the S3 object. The application then reads the content of the object from the S3 bucket for indexing.

The Logging team reported that Amazon CloudWatch metrics for the number of messages sent or received is showing zero. No togs are being received. What should the Security Engineer do to troubleshoot this issue?

A.
Add the following statement to the AWS managed CMKs:
A.
Add the following statement to the AWS managed CMKs:
Answers
B.
Add the following statement to the CMK key policy:
B.
Add the following statement to the CMK key policy:
Answers
C.
Add the following statement to the CMK key policy:
C.
Add the following statement to the CMK key policy:
Answers
D.
Add the following statement to the CMK key policy:
D.
Add the following statement to the CMK key policy:
Answers
Suggested answer: D

Developers in an organization have moved from a standard application deployment to containers.

The Security Engineer is tasked with ensuring that the containers are secure. Which strategies will reduce the attack surface and enhance the security of the containers? (Select TWO.)

A.
Use the containers to automate security deployments.
A.
Use the containers to automate security deployments.
Answers
B.
Limit resource consumption (CPU, memory), networking connections, ports, and unnecessary container libraries.
B.
Limit resource consumption (CPU, memory), networking connections, ports, and unnecessary container libraries.
Answers
C.
Segregate containers by host, function, and data classification.
C.
Segregate containers by host, function, and data classification.
Answers
D.
Use Docker Notary framework to sign task definitions.
D.
Use Docker Notary framework to sign task definitions.
Answers
E.
Enable container breakout at the host kernel.
E.
Enable container breakout at the host kernel.
Answers
Suggested answer: A, C

An organization wants to log all AWS API calls made within all of its AWS accounts, and must have a central place to analyze these logs. What steps should be taken to meet these requirements in the MOST secure manner? (Select TWO)

A.
Turn on AWS CloudTrail in each AWS account
A.
Turn on AWS CloudTrail in each AWS account
Answers
B.
Turn on CloudTrail in only the account that will be storing the logs
B.
Turn on CloudTrail in only the account that will be storing the logs
Answers
C.
Update the bucket ACL of the bucket in the account that will be storing the logs so that other accounts can log to it
C.
Update the bucket ACL of the bucket in the account that will be storing the logs so that other accounts can log to it
Answers
D.
Create a service-based role for CloudTrail and associate it with CloudTrail in each account
D.
Create a service-based role for CloudTrail and associate it with CloudTrail in each account
Answers
E.
Update the bucket policy of the bucket in the account that will be storing the logs so that other accounts can log to it
E.
Update the bucket policy of the bucket in the account that will be storing the logs so that other accounts can log to it
Answers
Suggested answer: A, E

An IT department currently has a Java web application deployed on Apache Tomcat running on Amazon EC2 instances. All traffic to the EC2 instances is sent through an internet-facing Application Load Balancer (ALB) The Security team has noticed during the past two days thousands of unusual read requests coming from hundreds of IP addresses. This is causing the Tomcat server to run out of threads and reject new connections Which the SIMPLEST change that would address this server issue?

A.
Create an Amazon CloudFront distribution and configure the ALB as the origin
A.
Create an Amazon CloudFront distribution and configure the ALB as the origin
Answers
B.
Block the malicious IPs with a network access list (NACL).
B.
Block the malicious IPs with a network access list (NACL).
Answers
C.
Create an AWS Web Application Firewall (WAF). and attach it to the ALB
C.
Create an AWS Web Application Firewall (WAF). and attach it to the ALB
Answers
D.
Map the application domain name to use Route 53
D.
Map the application domain name to use Route 53
Answers
Suggested answer: A

An organization has a multi-petabyte workload that it is moving to Amazon S3, but the CISO is concerned about cryptographic wear-out and the blast radius if a key is compromised. How can the CISO be assured that AWS KMS and Amazon S3 are addressing the concerns? (Select TWO )

A.
There is no API operation to retrieve an S3 object in its encrypted form.
A.
There is no API operation to retrieve an S3 object in its encrypted form.
Answers
B.
Encryption of S3 objects is performed within the secure boundary of the KMS service.
B.
Encryption of S3 objects is performed within the secure boundary of the KMS service.
Answers
C.
S3 uses KMS to generate a unique data key for each individual object.
C.
S3 uses KMS to generate a unique data key for each individual object.
Answers
D.
Using a single master key to encrypt all data includes having a single place to perform audits and usage validation.
D.
Using a single master key to encrypt all data includes having a single place to perform audits and usage validation.
Answers
E.
The KMS encryption envelope digitally signs the master key during encryption to prevent cryptographic wear-out
E.
The KMS encryption envelope digitally signs the master key during encryption to prevent cryptographic wear-out
Answers
Suggested answer: C, E
Total 590 questions
Go to page: of 59