ExamGecko
Home Home / Amazon / SCS-C01

Amazon SCS-C01 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











A company has recently recovered from a security incident that required the restoration of Amazon EC2 instances from snapshots. After performing a gap analysis of its disaster recovery procedures and backup strategies, the company is concerned that, next time, it will not be able to recover the EC2 instances if the AWS account was compromised and Amazon EBS snapshots were deleted.

All EBS snapshots are encrypted using an AWS KMS CMK.

Which solution would solve this problem?

A.
Create a new Amazon S3 bucket Use EBS lifecycle policies to move EBS snapshots to the new S3 bucket. Move snapshots to Amazon S3 Glacier using lifecycle policies, and apply Glacier Vault Lock policies to prevent deletion
A.
Create a new Amazon S3 bucket Use EBS lifecycle policies to move EBS snapshots to the new S3 bucket. Move snapshots to Amazon S3 Glacier using lifecycle policies, and apply Glacier Vault Lock policies to prevent deletion
Answers
B.
Use AWS Systems Manager to distribute a configuration that performs local backups of all attached disks to Amazon S3.
B.
Use AWS Systems Manager to distribute a configuration that performs local backups of all attached disks to Amazon S3.
Answers
C.
Create a new AWS account with limited privileges. Allow the new account to access the AWS KMS key used to encrypt the EBS snapshots, and copy the encrypted snapshots to the new account on a recuning basis
C.
Create a new AWS account with limited privileges. Allow the new account to access the AWS KMS key used to encrypt the EBS snapshots, and copy the encrypted snapshots to the new account on a recuning basis
Answers
D.
Use AWS Backup to copy EBS snapshots to Amazon S3.
D.
Use AWS Backup to copy EBS snapshots to Amazon S3.
Answers
Suggested answer: A

A security engineer needs to configure monitoring and auditing for AWS Lambda.

Which combination of actions using AWS services should the security engineer take to accomplish this goal? (Select TWO.)

A.
Use AWS Config to track configuration changes to Lambda functions, runtime environments, tags, handler names, code sizes, memory allocation, timeout settings, and concurrency settings, along with Lambda IAM execution role, subnet, and security group associations.
A.
Use AWS Config to track configuration changes to Lambda functions, runtime environments, tags, handler names, code sizes, memory allocation, timeout settings, and concurrency settings, along with Lambda IAM execution role, subnet, and security group associations.
Answers
B.
Use AWS CloudTrail to implement governance, compliance, operational, and risk auditing for Lambda.
B.
Use AWS CloudTrail to implement governance, compliance, operational, and risk auditing for Lambda.
Answers
C.
Use Amazon Inspector to automatically monitor for vulnerabilities and perform governance, compliance, operational, and risk auditing for Lambda.
C.
Use Amazon Inspector to automatically monitor for vulnerabilities and perform governance, compliance, operational, and risk auditing for Lambda.
Answers
D.
Use AWS Resource Access Manager to track configuration changes to Lambda functions, runtime environments, tags, handler names, code sizes, memory allocation, timeout settings, and concurrency settings, along with Lambda IAM execution role, subnet, and security group associations.
D.
Use AWS Resource Access Manager to track configuration changes to Lambda functions, runtime environments, tags, handler names, code sizes, memory allocation, timeout settings, and concurrency settings, along with Lambda IAM execution role, subnet, and security group associations.
Answers
E.
Use Amazon Macie to discover, classify, and protect sensitive data being executed inside the Lambda function.
E.
Use Amazon Macie to discover, classify, and protect sensitive data being executed inside the Lambda function.
Answers
Suggested answer: A, B

A company is setting up products to deploy in AWS Service Catalog. Management is concerned that when users launch products, elevated IAM privileges will be required to create resources. How should the company mitigate this concern?

A.
Add a template constraint to each product in the portfolio.
A.
Add a template constraint to each product in the portfolio.
Answers
B.
Add a launch constraint to each product in the portfolio.
B.
Add a launch constraint to each product in the portfolio.
Answers
C.
Define resource update constraints for each product in the portfolio.
C.
Define resource update constraints for each product in the portfolio.
Answers
D.
Update the AWS CloudFormalion template backing the product to include a service role configuration.
D.
Update the AWS CloudFormalion template backing the product to include a service role configuration.
Answers
Suggested answer: B

Explanation:

https://docs.aws.amazon.com/servicecatalog/latest/adminguide/constraints-launch.htmlLaunch constraints apply to products in the portfolio (product-portfolio association). Launchconstraints do not apply at the portfolio level or to a product across all portfolios. To associate alaunch constraint with all products in a portfolio, you must apply the launch constraint to eachproduct individually.


A Security Engineer has been asked to troubleshoot inbound connectivity to a web server. This single web server is not receiving inbound connections from the internet, whereas all other web servers are functioning properly. The architecture includes network ACLs, security groups, and a virtual security appliance. In addition, the Development team has implemented Application Load Balancers (ALBs) to distribute the load across all web servers. It is a requirement that traffic between the web servers and the internet flow through the virtual security appliance. The Security Engineer has verified the following:

A.
The rule set in the Security Groups is correct
A.
The rule set in the Security Groups is correct
Answers
B.
The rule set in the network ACLs is correct
B.
The rule set in the network ACLs is correct
Answers
C.
The rule set in the virtual appliance is correctWhich of the following are other valid items to troubleshoot in this scenario? (Choose two.)
C.
The rule set in the virtual appliance is correctWhich of the following are other valid items to troubleshoot in this scenario? (Choose two.)
Answers
D.
Verify that the 0.0.0.0/0 route in the route table for the web server subnet points to a NAT gateway.
D.
Verify that the 0.0.0.0/0 route in the route table for the web server subnet points to a NAT gateway.
Answers
E.
Verify which Security Group is applied to the particular web server’s elastic network interface (ENI).
E.
Verify which Security Group is applied to the particular web server’s elastic network interface (ENI).
Answers
F.
Verify that the 0.0.0.0/0 route in the route table for the web server subnet points to the virtual security appliance.
F.
Verify that the 0.0.0.0/0 route in the route table for the web server subnet points to the virtual security appliance.
Answers
G.
Verify the registered targets in the ALB.
G.
Verify the registered targets in the ALB.
Answers
H.
Verify that the 0.0.0.0/0 route in the public subnet points to a NAT gateway.
H.
Verify that the 0.0.0.0/0 route in the public subnet points to a NAT gateway.
Answers
Suggested answer: C, D

Explanation:

https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-eni.html

A company has a VPC with an IPv6 address range and a public subnet with an IPv6 address block. The VPC currently hosts some public Amazon EC2 instances but a Security Engineer needs to migrate a second application into the VPC that also requires IPv6 connectivity.

This new application will occasionally make API requests to an external, internet-accessible endpoint to receive updates However, the Security team does not want the application's EC2 instance exposed directly to the internet The Security Engineer intends to create a private subnet with a custom route table and to associate the route table with the private subnet What else does the Security Engineer need to do to ensure the application will not be exposed directly to the internet, but can still communicate as required''

A.
Launch a NAT instance in the public subnet Update the custom route table with a new route to the NAT instance
A.
Launch a NAT instance in the public subnet Update the custom route table with a new route to the NAT instance
Answers
B.
Remove the internet gateway, and add AWS PrivateLink to the VPC Then update the custom route table with a new route to AWS PrivateLink
B.
Remove the internet gateway, and add AWS PrivateLink to the VPC Then update the custom route table with a new route to AWS PrivateLink
Answers
C.
Add a managed NAT gateway to the VPC Update the custom route table with a new route to the gateway
C.
Add a managed NAT gateway to the VPC Update the custom route table with a new route to the gateway
Answers
D.
Add an egress-only internet gateway to the VPC. Update the custom route table with a new route to the gateway
D.
Add an egress-only internet gateway to the VPC. Update the custom route table with a new route to the gateway
Answers
Suggested answer: D

Which of the following are valid configurations for using SSL certificates with Amazon CloudFront?

(Select THREE )

A.
Default AWS Certificate Manager certificate
A.
Default AWS Certificate Manager certificate
Answers
B.
Custom SSL certificate stored in AWS KMS
B.
Custom SSL certificate stored in AWS KMS
Answers
C.
Default CloudFront certificate
C.
Default CloudFront certificate
Answers
D.
Custom SSL certificate stored in AWS Certificate Manager
D.
Custom SSL certificate stored in AWS Certificate Manager
Answers
E.
Default SSL certificate stored in AWS Secrets Manager
E.
Default SSL certificate stored in AWS Secrets Manager
Answers
F.
Custom SSL certificate stored in AWS IAM
F.
Custom SSL certificate stored in AWS IAM
Answers
Suggested answer: A, C, D

A company has implemented centralized logging and monitoring of AWS CloudTrail logs from all Regions in an Amazon S3 bucket. The log Hies are encrypted using AWS KMS. A Security Engineer is attempting to review the log files using a third-party tool hosted on an Amazon EC2 instance The Security Engineer is unable to access the logs in the S3 bucket and receives an access denied error message What should the Security Engineer do to fix this issue?

A.
Check that the role the Security Engineer uses grants permission to decrypt objects using the KMS CMK.
A.
Check that the role the Security Engineer uses grants permission to decrypt objects using the KMS CMK.
Answers
B.
Check that the role the Security Engineer uses grants permission to decrypt objects using the KMS CMK and gives access to the S3 bucket and objects
B.
Check that the role the Security Engineer uses grants permission to decrypt objects using the KMS CMK and gives access to the S3 bucket and objects
Answers
C.
Check that the role the EC2 instance profile uses grants permission lo decrypt objects using the KMS CMK and gives access to the S3 bucket and objects
C.
Check that the role the EC2 instance profile uses grants permission lo decrypt objects using the KMS CMK and gives access to the S3 bucket and objects
Answers
D.
Check that the role the EC2 instance profile uses grants permission to decrypt objects using the KMS CMK
D.
Check that the role the EC2 instance profile uses grants permission to decrypt objects using the KMS CMK
Answers
Suggested answer: C

Users report intermittent availability of a web application hosted on AWS. Monitoring systems report an excess of abnormal network traffic followed by high CPU utilization on the application web tier. Which of the following techniques will improve the availability of the application? (Select TWO.)

A.
Deploy AWS WAF to block all unsecured web applications from accessing the internet.
A.
Deploy AWS WAF to block all unsecured web applications from accessing the internet.
Answers
B.
Deploy an Intrusion Detection/Prevention System (IDS/IPS) to monitor or block unusual incoming network traffic.
B.
Deploy an Intrusion Detection/Prevention System (IDS/IPS) to monitor or block unusual incoming network traffic.
Answers
C.
Configure security groups to allow outgoing network traffic only from hosts that are protected with up-to-date antivirus software.
C.
Configure security groups to allow outgoing network traffic only from hosts that are protected with up-to-date antivirus software.
Answers
D.
Create Amazon CloudFront distribution and configure AWS WAF rules to protect the web applications from malicious traffic.
D.
Create Amazon CloudFront distribution and configure AWS WAF rules to protect the web applications from malicious traffic.
Answers
E.
Use the default Amazon VPC for externakfacing systems to allow AWS to actively block malicious network traffic affecting Amazon EC2 instances.
E.
Use the default Amazon VPC for externakfacing systems to allow AWS to actively block malicious network traffic affecting Amazon EC2 instances.
Answers
Suggested answer: B, D

A company uses SAML federation with AWS Identity and Access Management (IAM) to provide internal users with SSO for their AWS accounts. The company's identity provider certificate was rotated as part of its normal lifecycle. Shortly after, users started receiving the following error when attempting to log in:

"Error: Response Signature Invalid (Service: AWSSecuntyTokenService; Status Code: 400; Error Code: InvalidldentltyToken)" A security engineer needs to address the immediate issue and ensure that it will not occur again. Which combination of steps should the security engineer take to accomplish this? (Select TWO.)

A.
Download a new copy of the SAML metadata file from the identity provider Create a new IAM identity provider entity. Upload the new metadata file to the new IAM identity provider entity.
A.
Download a new copy of the SAML metadata file from the identity provider Create a new IAM identity provider entity. Upload the new metadata file to the new IAM identity provider entity.
Answers
B.
During the next certificate rotation period and before the current certificate expires, add a new certificate as the secondary to the identity provider. Generate a new metadata file and upload it to the IAM identity provider entity. Perform automated or manual rotation of the certificate when required.
B.
During the next certificate rotation period and before the current certificate expires, add a new certificate as the secondary to the identity provider. Generate a new metadata file and upload it to the IAM identity provider entity. Perform automated or manual rotation of the certificate when required.
Answers
C.
Download a new copy of the SAML metadata file from the identity provider Upload the new metadata to the IAM identity provider entity configured for the SAML integration in question.
C.
Download a new copy of the SAML metadata file from the identity provider Upload the new metadata to the IAM identity provider entity configured for the SAML integration in question.
Answers
D.
During the next certificate rotation period and before the current certificate expires, add a new certificate as the secondary to the identity provider. Generate a new copy of the metadata file and create a new IAM identity provider entity. Upload the metadata file to the new IAM identity provider entity. Perform automated or manual rotation of the certificate when required.
D.
During the next certificate rotation period and before the current certificate expires, add a new certificate as the secondary to the identity provider. Generate a new copy of the metadata file and create a new IAM identity provider entity. Upload the metadata file to the new IAM identity provider entity. Perform automated or manual rotation of the certificate when required.
Answers
E.
Download a new copy of the SAML metadata file from the identity provider Create a new IAM identity provider entity. Upload the new metadata file to the new IAM identity provider entity. Update the identity provider configurations to pass a new IAM identity provider entity name in the SAML assertion.
E.
Download a new copy of the SAML metadata file from the identity provider Create a new IAM identity provider entity. Upload the new metadata file to the new IAM identity provider entity. Update the identity provider configurations to pass a new IAM identity provider entity name in the SAML assertion.
Answers
Suggested answer: A, D

A company Is building a data lake on Amazon S3. The data consists of millions of small files containing sensitive information. The security team has the following requirements for the architecture:

• Data must be encrypted in transit.

• Data must be encrypted at rest.

• The bucket must be private, but if the bucket is accidentally made public, the data must remain confidential. Which combination of steps would meet the requirements? (Select THREE.)

A.
Enable AES-256 encryption using server-side encryption with Amazon S3-managed encryption keys (SSE-S3) on the S3 bucket
A.
Enable AES-256 encryption using server-side encryption with Amazon S3-managed encryption keys (SSE-S3) on the S3 bucket
Answers
B.
Enable default encryption with server-side encryption with AWS KMS-managed keys (SSE-KMS) on the S3 bucket.
B.
Enable default encryption with server-side encryption with AWS KMS-managed keys (SSE-KMS) on the S3 bucket.
Answers
C.
Add a bucket policy that includes a deny if a PutObject request does not include awsiSecureTcanspoct.
C.
Add a bucket policy that includes a deny if a PutObject request does not include awsiSecureTcanspoct.
Answers
D.
Add a bucket policy with ws: Sourcelpto Allow uploads and downloads from the corporate intranet only.
D.
Add a bucket policy with ws: Sourcelpto Allow uploads and downloads from the corporate intranet only.
Answers
E.
Add a bucket policy that includes a deny if a PutObject request does not include s3:x-amz-sairv9rside- enctyption: "aws: kms".
E.
Add a bucket policy that includes a deny if a PutObject request does not include s3:x-amz-sairv9rside- enctyption: "aws: kms".
Answers
F.
Enable Amazon Macie to monitor and act on changes to the data lake's S3 bucket.
F.
Enable Amazon Macie to monitor and act on changes to the data lake's S3 bucket.
Answers
Suggested answer: B, D, F
Total 590 questions
Go to page: of 59