ExamGecko
Home Home / Amazon / SCS-C01

Amazon SCS-C01 Practice Test - Questions Answers, Page 47

Question list
Search
Search

List of questions

Search

Related questions











A System Administrator is unable to start an Amazon EC2 instance in the eu-west-1 Region using an IAM role The same System Administrator is able to start an EC2 instance in the eu-west-2 and euwest- 3 Regions. The AWSSystemAdministrator access policy attached to the System Administrator IAM role allows unconditional access to all AWS services and resources within the account Which configuration caused this issue?

A.
An SCP is attached to the account with the following permission statement:
A.
An SCP is attached to the account with the following permission statement:
Answers
B.
A permission boundary policy is attached to the System Administrator role with the following permission statement:
B.
A permission boundary policy is attached to the System Administrator role with the following permission statement:
Answers
C.
A permission boundary is attached to the System Administrator role with the following permission statement:
C.
A permission boundary is attached to the System Administrator role with the following permission statement:
Answers
D.
An SCP is attached to the account with the following statement:
D.
An SCP is attached to the account with the following statement:
Answers
Suggested answer: B

A company manages three separate AWS accounts for its production, development, and test environments, Each Developer is assigned a unique IAM user under the development account. A new application hosted on an Amazon EC2 instance in the developer account requires read access to the archived documents stored in an Amazon S3 bucket in the production account. How should access be granted?

A.
Create an IAM role in the production account and allow EC2 instances in the development account to assume that role using the trust policy. Provide read access for the required S3 bucket to this role.
A.
Create an IAM role in the production account and allow EC2 instances in the development account to assume that role using the trust policy. Provide read access for the required S3 bucket to this role.
Answers
B.
Use a custom identity broker to allow Developer IAM users to temporarily access the S3 bucket.
B.
Use a custom identity broker to allow Developer IAM users to temporarily access the S3 bucket.
Answers
C.
Create a temporary IAM user for the application to use in the production account.
C.
Create a temporary IAM user for the application to use in the production account.
Answers
D.
Create a temporary IAM user in the production account and provide read access to Amazon S3.Generate the temporary IAM user's access key and secret key and store these on the EC2 instance used by the application in the development account.
D.
Create a temporary IAM user in the production account and provide read access to Amazon S3.Generate the temporary IAM user's access key and secret key and store these on the EC2 instance used by the application in the development account.
Answers
Suggested answer: A

Explanation:

https://aws.amazon.com/premiumsupport/knowledge-center/cross-account-access-s3/

A company is operating a website using Amazon CloudFornt. CloudFront servers some content from Amazon S3 and other from web servers running EC2 instances behind an Application. Load Balancer (ALB). Amazon DynamoDB is used as the data store. The company already uses AWS Certificate Manager (ACM) to store a public TLS certificate that can optionally secure connections between the website users and CloudFront. The company has a new requirement to enforce end-to-end encryption in transit.

Which combination of steps should the company take to meet this requirement? (Select THREE.)

A.
Update the CloudFront distribution. configuring it to optionally use HTTPS when connecting toorigins on Amazon S3
A.
Update the CloudFront distribution. configuring it to optionally use HTTPS when connecting toorigins on Amazon S3
Answers
B.
Update the web application configuration on the web servers to use HTTPS instead of HTTP whenconnecting to DynamoDB
B.
Update the web application configuration on the web servers to use HTTPS instead of HTTP whenconnecting to DynamoDB
Answers
C.
Update the CloudFront distribution to redirect HTTP corrections to HTTPS
C.
Update the CloudFront distribution to redirect HTTP corrections to HTTPS
Answers
D.
Configure the web servers on the EC2 instances to listen using HTTPS using the public ACM TLScertificate Update the ALB to connect to the target group using HTTPS
D.
Configure the web servers on the EC2 instances to listen using HTTPS using the public ACM TLScertificate Update the ALB to connect to the target group using HTTPS
Answers
E.
Update the ALB listen to listen using HTTPS using the public ACM TLS certificate. Update theCloudFront distribution to connect to the HTTPS listener.
E.
Update the ALB listen to listen using HTTPS using the public ACM TLS certificate. Update theCloudFront distribution to connect to the HTTPS listener.
Answers
F.
Create a TLS certificate Configure the web servers on the EC2 instances to use HTTPS only with thatcertificate. Update the ALB to connect to the target group using HTTPS.
F.
Create a TLS certificate Configure the web servers on the EC2 instances to use HTTPS only with thatcertificate. Update the ALB to connect to the target group using HTTPS.
Answers
Suggested answer: B, C, E

A company has a web-based application using Amazon CloudFront and running on Amazon Elastic Container Service (Amazon ECS) behind an Application Load Balancer (ALB). The ALB is terminating TLS and balancing load across ECS service tasks A security engineer needs to design a solution to ensure that application content is accessible only through CloudFront and that I is never accessible directly. How should the security engineer build the MOST secure solution?

A.
Add an origin custom header Set the viewer protocol policy to HTTP and HTTPS Set the originprotocol pokey to HTTPS only Update the application to validate the CloudFront custom header
A.
Add an origin custom header Set the viewer protocol policy to HTTP and HTTPS Set the originprotocol pokey to HTTPS only Update the application to validate the CloudFront custom header
Answers
B.
Add an origin custom header Set the viewer protocol policy to HTTPS only Set the origin protocolpolicy to match viewer Update the application to validate the CloudFront custom header.
B.
Add an origin custom header Set the viewer protocol policy to HTTPS only Set the origin protocolpolicy to match viewer Update the application to validate the CloudFront custom header.
Answers
C.
Add an origin custom header Set the viewer protocol policy to redirect HTTP to HTTPS Set theorigin protocol policy to HTTP only Update the application to validate the CloudFront custom header.
C.
Add an origin custom header Set the viewer protocol policy to redirect HTTP to HTTPS Set theorigin protocol policy to HTTP only Update the application to validate the CloudFront custom header.
Answers
D.
Add an origin custom header Set the viewer protocol policy to redirect HTTP to HTTPS. Set theorigin protocol policy to HTTPS only Update the application to validate the CloudFront customheader
D.
Add an origin custom header Set the viewer protocol policy to redirect HTTP to HTTPS. Set theorigin protocol policy to HTTPS only Update the application to validate the CloudFront customheader
Answers
Suggested answer: D

A company needs to use HTTPS when connecting to its web applications to meet compliancerequirements. These web applications run in Amazon VPC on Amazon EC2 instances behind anApplication Load Balancer (ALB). A security engineer wants to ensure that the load balancer win onlyaccept connections over port 443. even if the ALB is mistakenly configured with an HTTP listenerWhich configuration steps should the security engineer take to accomplish this task?

A.
Create a security group with a rule that denies Inbound connections from 0.0.0 0/0 on port 00.Attach this security group to the ALB to overwrite more permissive rules from the ALB's default security group.
A.
Create a security group with a rule that denies Inbound connections from 0.0.0 0/0 on port 00.Attach this security group to the ALB to overwrite more permissive rules from the ALB's default security group.
Answers
B.
Create a network ACL that denies inbound connections from 0 0.0.0/0 on port 80 Associate the network ACL with the VPC s internet gateway
B.
Create a network ACL that denies inbound connections from 0 0.0.0/0 on port 80 Associate the network ACL with the VPC s internet gateway
Answers
C.
Create a network ACL that allows outbound connections to the VPC IP range on port 443 only.Associate the network ACL with the VPC's internet gateway.
C.
Create a network ACL that allows outbound connections to the VPC IP range on port 443 only.Associate the network ACL with the VPC's internet gateway.
Answers
D.
Create a security group with a single inbound rule that allows connections from 0.0.0 0/0 on port 443. Ensure this security group is the only one associated with the ALB
D.
Create a security group with a single inbound rule that allows connections from 0.0.0 0/0 on port 443. Ensure this security group is the only one associated with the ALB
Answers
Suggested answer: D

A company created an AWS account for its developers to use for testing and learning purposes Because MM account will be shared among multiple teams of developers, the company wants to restrict the ability to stop and terminate Amazon EC2 instances so that a team can perform these actions only on the instances it owns.

Developers were Instructed to tag al their instances with a Team tag key and use the team name in the tag value One of the first teams to use this account is Business Intelligence A security engineer needs to develop a highly scalable solution for providing developers with access to the appropriate resources within the account The security engineer has already created individual 1AM roles for each team. Which additional configuration steps should the security engineer take to complete the task?

A.
For each team, create an AM policy similar to the one that fellows Populate the ec2:ResourceTag/Team condition key with a proper team name Attach resulting policies to the corresponding 1AM roles.
A.
For each team, create an AM policy similar to the one that fellows Populate the ec2:ResourceTag/Team condition key with a proper team name Attach resulting policies to the corresponding 1AM roles.
Answers
B.
For each team create an 1AM policy similar to the one that follows Populate the aws TagKeys/Team condition key with a proper team name. Attach the resuming policies to the corresponding 1AM roles.
B.
For each team create an 1AM policy similar to the one that follows Populate the aws TagKeys/Team condition key with a proper team name. Attach the resuming policies to the corresponding 1AM roles.
Answers
C.
Tag each 1AM role with a Team lag key. and use the team name in the tag value. Create an 1AM policy similar to the one that follows, and attach 4 to all the 1AM roles used by developers.
C.
Tag each 1AM role with a Team lag key. and use the team name in the tag value. Create an 1AM policy similar to the one that follows, and attach 4 to all the 1AM roles used by developers.
Answers
D.
Tag each IAM role with the Team key, and use the team name in the tag value. Create an IAM policy similar to the one that follows, and it to all the IAM roles used by developers.
D.
Tag each IAM role with the Team key, and use the team name in the tag value. Create an IAM policy similar to the one that follows, and it to all the IAM roles used by developers.
Answers
E.
Option A
E.
Option A
Answers
F.
Option B
F.
Option B
Answers
G.
Option C
G.
Option C
Answers
H.
Option D
H.
Option D
Answers
Suggested answer: A

An ecommerce website was down for 1 hour following a DDoS attack Users were unable to connect to the website during the attack period. The ecommerce company's security team is worried about future potential attacks and wants to prepare for such events The company needs to minimize downtime in its response to similar attacks in the future. Which steps would help achieve this9 (Select TWO )

A.
Enable Amazon GuardDuty to automatically monitor for malicious activity and block unauthorized access.
A.
Enable Amazon GuardDuty to automatically monitor for malicious activity and block unauthorized access.
Answers
B.
Subscribe to AWS Shield Advanced and reach out to AWS Support in the event of an attack.
B.
Subscribe to AWS Shield Advanced and reach out to AWS Support in the event of an attack.
Answers
C.
Use VPC Flow Logs to monitor network: traffic and an AWS Lambda function to automatically block an attacker's IP using security groups.
C.
Use VPC Flow Logs to monitor network: traffic and an AWS Lambda function to automatically block an attacker's IP using security groups.
Answers
D.
Set up an Amazon CloudWatch Events rule to monitor the AWS CloudTrail events in real time use AWS Config rules to audit the configuration, and use AWS Systems Manager for remediation.
D.
Set up an Amazon CloudWatch Events rule to monitor the AWS CloudTrail events in real time use AWS Config rules to audit the configuration, and use AWS Systems Manager for remediation.
Answers
E.
Use AWS WAF to create rules to respond to such attacks
E.
Use AWS WAF to create rules to respond to such attacks
Answers
Suggested answer: B, E

A security engineer must troubleshoot an administrator's inability to make an existing Amazon S3 bucket public in an account that is part of an organization n AWS Organizations. The administrator switched the role from the master account to a member account and then attempted to make one S3 bucket public. This action was immediately denied Which actions should the security engineer take to troubleshoot the permissions issue? (Select TWO.)

A.
Review the cross-account role permissions and the S3 bucket policy Verify that the Amazon S3 block public access option in the member account is deactivated.
A.
Review the cross-account role permissions and the S3 bucket policy Verify that the Amazon S3 block public access option in the member account is deactivated.
Answers
B.
Review the role permissions m the master account and ensure it has sufficient privileges to perform S3 operations
B.
Review the role permissions m the master account and ensure it has sufficient privileges to perform S3 operations
Answers
C.
Filter AWS CloudTrail logs for the master account to find the original deny event and update the cross-account role m the member account accordingly Verify that the Amazon S3 block public access option in the master account is deactivated.
C.
Filter AWS CloudTrail logs for the master account to find the original deny event and update the cross-account role m the member account accordingly Verify that the Amazon S3 block public access option in the master account is deactivated.
Answers
D.
Evaluate the SCPs covering the member account and the permissions boundary of the role in the member account for missing permissions and explicit denies.
D.
Evaluate the SCPs covering the member account and the permissions boundary of the role in the member account for missing permissions and explicit denies.
Answers
E.
Ensure the S3 bucket policy explicitly allows the s3 PutBucketPublicAccess action for the role m the member account
E.
Ensure the S3 bucket policy explicitly allows the s3 PutBucketPublicAccess action for the role m the member account
Answers
Suggested answer: B, E

Attach the following SCP to the OU that contains this account:

In the Amazon EC2 console, select the Always Encrypt new EBS volumes setting for each AWS Region.

A.
For each finding In the audit report, run the ec2 copy-snapshot command and use the encrypted flag specifying an AWS Key Management Service (AWS KMS) CMK
A.
For each finding In the audit report, run the ec2 copy-snapshot command and use the encrypted flag specifying an AWS Key Management Service (AWS KMS) CMK
Answers
B.
Create a private AMI for the company Configure encryption for the private AMI by selecting the custom AMI in the Amazon EC2 console, the destination AWS Region and the source account s AWS Key Management Service (AWS KMS) master key.
B.
Create a private AMI for the company Configure encryption for the private AMI by selecting the custom AMI in the Amazon EC2 console, the destination AWS Region and the source account s AWS Key Management Service (AWS KMS) master key.
Answers
Suggested answer: A

A company is using Amazon Elastic Container Service (Amazon ECS) to deploy an application that deals with sensitive data During a recent security audit, the company identified a security issue in which Amazon RDS credentials were stored with the application code In the company's source code repository A security engineer needs to develop a solution to ensure that database credentials are stored securely and rotated periodically. The credentials should be accessible to the application only The engineer also needs to prevent database administrators from sharing database credentials as plaintext with other teammates. The solution must also minimize administrate overhead Which solution meets these requirements?

A.
Use the AWS Systems Manager Parameter Store to generate database credentials. Use an 1AM profile for ECS tasks to restrict access to database credentials to specific containers only.
A.
Use the AWS Systems Manager Parameter Store to generate database credentials. Use an 1AM profile for ECS tasks to restrict access to database credentials to specific containers only.
Answers
B.
Use AWS Secrets Manager to store database credentials. Use an 1AM inline policy for ECS tasks to restrict access to database credentials to specific containers only.
B.
Use AWS Secrets Manager to store database credentials. Use an 1AM inline policy for ECS tasks to restrict access to database credentials to specific containers only.
Answers
C.
Use the AWS Systems Manager Parameter Store to store database credentials. Use 1AM roles for ECS tasks to restrict access to database credentials lo specific containers only
C.
Use the AWS Systems Manager Parameter Store to store database credentials. Use 1AM roles for ECS tasks to restrict access to database credentials lo specific containers only
Answers
D.
Use AWS Secrets Manager to store database credentials. Use 1AM roles for ECS tasks to restrict access to database credentials to specific containers only.
D.
Use AWS Secrets Manager to store database credentials. Use 1AM roles for ECS tasks to restrict access to database credentials to specific containers only.
Answers
Suggested answer: D
Total 590 questions
Go to page: of 59