ExamGecko
Home Home / Amazon / SCS-C01

Amazon SCS-C01 Practice Test - Questions Answers, Page 51

Question list
Search
Search

List of questions

Search

Related questions











A company uses Amazon RDS for MySQL as a database engine for its applications. A recent security audit revealed an RDS instance that is not compliant with company policy for encrypting data at rest. A security engineer at the company needs to ensure that all existing RDS databases are encrypted using server-side encryption and that any future deviations from the policy are detected. Which combination of steps should the security engineer take to accomplish this? (Select TWO.)

A.
Create an AWS Config rule to detect the creation of unencrypted RDS databases. Create an Amazon EventBridge (Amazon CloudWatch Events) rule to trigger on the AWS Config rules compliance state change and use Amazon Simple Notification Service (Amazon SNS) to notify the security operations team.
A.
Create an AWS Config rule to detect the creation of unencrypted RDS databases. Create an Amazon EventBridge (Amazon CloudWatch Events) rule to trigger on the AWS Config rules compliance state change and use Amazon Simple Notification Service (Amazon SNS) to notify the security operations team.
Answers
B.
Use AWS System Manager State Manager to detect RDS database encryption configuration drift.Create an Amazon EventBridge (Amazon CloudWatch Events) rule to track state changes and use Amazon Simple Notification Service (Amazon SNS) to notify the security operations team.
B.
Use AWS System Manager State Manager to detect RDS database encryption configuration drift.Create an Amazon EventBridge (Amazon CloudWatch Events) rule to track state changes and use Amazon Simple Notification Service (Amazon SNS) to notify the security operations team.
Answers
C.
Create a read replica for the existing unencrypted RDS database and enable replica encryption in the process. Once the replica becomes active, promote it into a standalone database instance and terminate the unencrypted database instance.
C.
Create a read replica for the existing unencrypted RDS database and enable replica encryption in the process. Once the replica becomes active, promote it into a standalone database instance and terminate the unencrypted database instance.
Answers
D.
Take a snapshot of the unencrypted RDS database. Copy the snapshot and enable snapshot encryption in the process. Restore the database instance from the newly created encrypted snapshot. Terminate the unencrypted database instance.
D.
Take a snapshot of the unencrypted RDS database. Copy the snapshot and enable snapshot encryption in the process. Restore the database instance from the newly created encrypted snapshot. Terminate the unencrypted database instance.
Answers
E.
Enable encryption for the identified unencrypted RDS instance by changing the configurations of the existing database
E.
Enable encryption for the identified unencrypted RDS instance by changing the configurations of the existing database
Answers
Suggested answer: A, D

A company is running an application in The eu-west-1 Region. The application uses an AWS Key Management Service (AWS KMS) CMK to encrypt sensitive dat a. The company plans to deploy the application in the eu-north-1 Region. A security engineer needs to implement a key management solution for the application deployment in the new Region. The security engineer must minimize changes to the application code. Which change should the security engineer make to the AWS KMS configuration to meet these requirements?

A.
Update the key policies in eu-west-1. Point the application in eu-north-1 to use the same CMK as the application in eu-west-1.
A.
Update the key policies in eu-west-1. Point the application in eu-north-1 to use the same CMK as the application in eu-west-1.
Answers
B.
Allocate a new CMK to eu-north-1 to be used by the application that is deployed in that Region.
B.
Allocate a new CMK to eu-north-1 to be used by the application that is deployed in that Region.
Answers
C.
Allocate a new CMK to eu-north-1. Create the same alias name for both keys. Configure the application deployment to use the key alias.
C.
Allocate a new CMK to eu-north-1. Create the same alias name for both keys. Configure the application deployment to use the key alias.
Answers
D.
Allocate a new CMK to eu-north-1. Create an alias for eu-'-1. Change the application code to point to the alias for eu-'-1.
D.
Allocate a new CMK to eu-north-1. Create an alias for eu-'-1. Change the application code to point to the alias for eu-'-1.
Answers
Suggested answer: B

A development team is using an AWS Key Management Service (AWS KMS) CMK to try to encrypt and decrypt a secure string parameter from AWS Systems Manager Parameter Store. However, the development team receives an error message on each attempt.

Which issues that are related to the CMK could be reasons for the error? (Select TWO.)

A.
The CMK that is used in the attempt does not exist.
A.
The CMK that is used in the attempt does not exist.
Answers
B.
The CMK that is used in the attempt needs to be rotated.
B.
The CMK that is used in the attempt needs to be rotated.
Answers
C.
The CMK that is used in the attempt is using the CMK's key ID instead of the CMK ARN.
C.
The CMK that is used in the attempt is using the CMK's key ID instead of the CMK ARN.
Answers
D.
The CMK that is used in the attempt is not enabled.
D.
The CMK that is used in the attempt is not enabled.
Answers
E.
The CMK that is used in the attempt is using an alias.
E.
The CMK that is used in the attempt is using an alias.
Answers
Suggested answer: A, D

A company wants to ensure that its AWS resources can be launched only in the us-east-1 and uswest- 2 Regions. What is the MOST operationally efficient solution that will prevent developers from launching Amazon EC2 instances in other Regions?

A.
Enable Amazon GuardDuty in all Regions. Create alerts to detect unauthorized activity outside useast- 1 and us-west-2.
A.
Enable Amazon GuardDuty in all Regions. Create alerts to detect unauthorized activity outside useast- 1 and us-west-2.
Answers
B.
Use an organization in AWS Organizations. Attach an SCP that allows all actions when the aws:Requested Region condition key is either us-east-1 or us-west-2. Delete the FullAWSAccess policy.
B.
Use an organization in AWS Organizations. Attach an SCP that allows all actions when the aws:Requested Region condition key is either us-east-1 or us-west-2. Delete the FullAWSAccess policy.
Answers
C.
Provision EC2 resources by using AWS Cloud Formation templates through AWS CodePipeline.Allow only the values of us-east-1 and us-west-2 in the AWS CloudFormation template's parameters.
C.
Provision EC2 resources by using AWS Cloud Formation templates through AWS CodePipeline.Allow only the values of us-east-1 and us-west-2 in the AWS CloudFormation template's parameters.
Answers
D.
Create an AWS Config rule to prevent unauthorized activity outside us-east-1 and us-west-2.
D.
Create an AWS Config rule to prevent unauthorized activity outside us-east-1 and us-west-2.
Answers
Suggested answer: C

A company is implementing a new application in a new AWS account. A VPC and subnets have been created for the application. The application has been peered to an existing VPC in another account in the same AWS Region for database access. Amazon EC2 instances will regularly be created and terminated in the application VPC, but only some of them will need access to the databases in the peered VPC over TCP port 1521. A security engineer must ensure that only the EC2 instances that need access to the databases can access them through the network.

How can the security engineer implement this solution?

A.
Create a new security group in the database VPC and create an inbound rule that allows all traffic from the IP address range of the application VPC. Add a new network ACL rule on the database subnets. Configure the rule to TCP port 1521 from the IP address range of the application VPC. Attach the new security group to the database instances that the application instances need to access.
A.
Create a new security group in the database VPC and create an inbound rule that allows all traffic from the IP address range of the application VPC. Add a new network ACL rule on the database subnets. Configure the rule to TCP port 1521 from the IP address range of the application VPC. Attach the new security group to the database instances that the application instances need to access.
Answers
B.
Create a new security group in the application VPC with an inbound rule that allows the IP address range of the database VPC over TCP port 1521. Create a new security group in the database VPC with an inbound rule that allows the IP address range of the application VPC over port 1521. Attach the new security group to the database instances and the application instances that need database access.
B.
Create a new security group in the application VPC with an inbound rule that allows the IP address range of the database VPC over TCP port 1521. Create a new security group in the database VPC with an inbound rule that allows the IP address range of the application VPC over port 1521. Attach the new security group to the database instances and the application instances that need database access.
Answers
C.
Create a new security group in the application VPC with no inbound rules. Create a new security group in the database VPC with an inbound rule that allows TCP port 1521 from the new application security group in the application VPC. Attach the application security group to the application instances that need database access, and attach the database security group to the database instances.
C.
Create a new security group in the application VPC with no inbound rules. Create a new security group in the database VPC with an inbound rule that allows TCP port 1521 from the new application security group in the application VPC. Attach the application security group to the application instances that need database access, and attach the database security group to the database instances.
Answers
D.
Create a new security group in the application VPC with an inbound rule that allows the IP address range of the database VPC over TCP port 1521. Add a new network ACL rule on the database subnets. Configure the rule to allow all traffic from the IP address range of the application VPC.Attach the new security group to the application instances that need database access.
D.
Create a new security group in the application VPC with an inbound rule that allows the IP address range of the database VPC over TCP port 1521. Add a new network ACL rule on the database subnets. Configure the rule to allow all traffic from the IP address range of the application VPC.Attach the new security group to the application instances that need database access.
Answers
Suggested answer: C

A company stores sensitive documents in Amazon S3 by using server-side encryption with an AWS Key Management Service (AWS KMS) CMK. A new requirement mandates that the CMK that is used for these documents can be used only for S3 actions.

Which statement should the company add to the key policy to meet this requirement?

A.
A.
Answers
B.
B.
Answers
Suggested answer: A

A security engineer is defining the controls required to protect the AWS account root user credentials in an AWS Organizations hierarchy. The controls should also limit the impact in case these credentials have been compromised. Which combination of controls should the security engineer propose? (Select THREE.)

A.
A.
Answers
B.
B.
Answers
C.
Enable multi-factor authentication (MFA) for the root user.
C.
Enable multi-factor authentication (MFA) for the root user.
Answers
D.
Set a strong randomized password and store it in a secure location.
D.
Set a strong randomized password and store it in a secure location.
Answers
E.
Create an access key ID and secret access key, and store them in a secure location.
E.
Create an access key ID and secret access key, and store them in a secure location.
Answers
F.
Apply the following permissions boundary to the toot user:
F.
Apply the following permissions boundary to the toot user:
Answers
Suggested answer: A, C, E

A company is using AWS Organizations. The company wants to restrict AWS usage to the eu-west-1 Region for all accounts under an OU that is named "development." The solution must persist restrictions to existing and new AWS accounts under the development OU.

A.
Option A
A.
Option A
Answers
B.
Option B
B.
Option B
Answers
C.
Option C
C.
Option C
Answers
D.
Option D
D.
Option D
Answers
Suggested answer: A

A company is undergoing a layer 3 and layer 4 DDoS attack on its web servers running on AWS.

Which combination of AWS services and features will provide protection in this scenario? (Select THREE).

A.
Amazon Route 53
A.
Amazon Route 53
Answers
B.
AWS Certificate Manager (ACM)
B.
AWS Certificate Manager (ACM)
Answers
C.
Amazon S3
C.
Amazon S3
Answers
D.
AWS Shield
D.
AWS Shield
Answers
E.
Elastic Load Balancer
E.
Elastic Load Balancer
Answers
F.
Amazon GuardDuty
F.
Amazon GuardDuty
Answers
Suggested answer: D, E, F

A security engineer needs to build a solution to turn AWS CloudTrail back on in multiple AWS Regions in case it is ever turned off. What is the MOST efficient way to implement this solution?

A.
Use AWS Config with a managed rule to trigger the AWS-EnableCloudTrail remediation.
A.
Use AWS Config with a managed rule to trigger the AWS-EnableCloudTrail remediation.
Answers
B.
Create an Amazon EventBridge (Amazon CloudWatch Events) event with a cloudtrail.amazonaws.com event source and a StartLogging event name to trigger an AWS Lambda function to call the StartLogging API.
B.
Create an Amazon EventBridge (Amazon CloudWatch Events) event with a cloudtrail.amazonaws.com event source and a StartLogging event name to trigger an AWS Lambda function to call the StartLogging API.
Answers
C.
Create an Amazon CloudWatch alarm with a cloudtrail.amazonaws.com event source and a StopLogging event name to trigger an AWS Lambda function to call the StartLogging API.
C.
Create an Amazon CloudWatch alarm with a cloudtrail.amazonaws.com event source and a StopLogging event name to trigger an AWS Lambda function to call the StartLogging API.
Answers
D.
Monitor AWS Trusted Advisor to ensure CloudTrail logging is enabled.
D.
Monitor AWS Trusted Advisor to ensure CloudTrail logging is enabled.
Answers
Suggested answer: B
Total 590 questions
Go to page: of 59