ExamGecko
Home Home / Amazon / SCS-C01

Amazon SCS-C01 Practice Test - Questions Answers, Page 53

Question list
Search
Search

List of questions

Search

Related questions











A security engineer creates an Amazon S3 bucket policy that denies access to all users. A few days later, the security engineer adds an additional statement to the bucket policy to allow read-only access to one other employee. Even after updating the policy, the employee still receives an access denied message.

What is the likely cause of this access denial?

A security engineer is working with a company to design an ecommerce application. The application will run on Amazon EC2 instances that run in an Auto Scaling group behind an Application Load Balancer (ALB). The application will use an Amazon RDS DB instance for its database.

The only required connectivity from the internet is for HTTP and HTTPS traffic to the application. Theapplication must communicate with an external payment provider that allows traffic only from apreconfigured allow list of IP addresses. The company must ensure that communications with theexternal payment provider are not interrupted as the environment scales. Which combination of actions should the security engineer recommend to meet these requirements? (Select THREE.)

A.
Deploy a NAT gateway in each private subnet for every Availability Zone that is in use.
A.
Deploy a NAT gateway in each private subnet for every Availability Zone that is in use.
Answers
B.
Place the DB instance in a public subnet.
B.
Place the DB instance in a public subnet.
Answers
C.
Place the DB instance in a private subnet.
C.
Place the DB instance in a private subnet.
Answers
D.
Configure the Auto Scaling group to place the EC2 instances in a public subnet.
D.
Configure the Auto Scaling group to place the EC2 instances in a public subnet.
Answers
E.
Configure the Auto Scaling group to place the EC2 instances in a private subnet.
E.
Configure the Auto Scaling group to place the EC2 instances in a private subnet.
Answers
F.
Deploy the ALB in a private subnet.
F.
Deploy the ALB in a private subnet.
Answers
Suggested answer: A, C, E

A company has two teams, and each team needs to access its respective Amazon S3 buckets. The company anticipates adding more teams that also will have their own S3 buckets. When the company adds these teams, team members will need the ability to be assigned to multiple teams.

Team members also will need the ability to change teams. Additional S3 buckets can be created or deleted. An 1AM administrator must design a solution to accomplish these goals. The solution also must be scalable and must require the least possible operational overhead. Which solution meets these requirements?

A.
Add users to groups that represent the teams. Create a policy for each team that allows the team to access its respective S3 buckets only. Attach the policy to the corresponding group.
A.
Add users to groups that represent the teams. Create a policy for each team that allows the team to access its respective S3 buckets only. Attach the policy to the corresponding group.
Answers
B.
Create an 1AM role for each team. Create a policy for each team that allows the team to access its respective S3 buckets only. Attach the policy to the corresponding role.
B.
Create an 1AM role for each team. Create a policy for each team that allows the team to access its respective S3 buckets only. Attach the policy to the corresponding role.
Answers
C.
Create 1AM roles that are labeled with an access tag value of a team. Create one policy that allows dynamic access to S3 buckets with the same tag. Attach the policy to the 1AM roles. Tag the S3 buckets accordingly.
C.
Create 1AM roles that are labeled with an access tag value of a team. Create one policy that allows dynamic access to S3 buckets with the same tag. Attach the policy to the 1AM roles. Tag the S3 buckets accordingly.
Answers
D.
Implement a role-based access control (RBAC) authorization model. Create the corresponding policies, and attach them to the 1AM users.
D.
Implement a role-based access control (RBAC) authorization model. Create the corresponding policies, and attach them to the 1AM users.
Answers
Suggested answer: A

A company wants to monitor the deletion of customer managed CMKs A security engineer must create an alarm that will notify the company before a CMK is deleted The security engineer has configured the integration of AWS CloudTrail with Amazon CloudWatch What should the security engineer do next to meet this requirement?

Within AWS Key Management Service (AWS KMS} specify the deletion time of the key material during CMK creation AWS KMS will automatically create a CloudWatch. Create an amazon Eventbridge (Amazon CloudWatch Events) rule to look for API calls of DeleteAlias Create an AWS Lamabda function to send an Amazon Simple Notification Service (Amazon SNS) messages to the company Add the Lambda functions as the target of the Eventbridge (CloudWatch Events) rule.

Create an Amazon EventBridge (Amazon CloudWath Events) rule to look for API calls of DisableKey and ScheduleKeyDelection. Create an AWS Lambda function to generate the alarm and send the notification to the company. Add the lambda function as the target of the SNS policy.

A.
Use inbound rule 100 to allow traffic on TCP port 443 Use inbound rule 200 to deny traffic on TCP port 3306 Use outbound rule 100 to allow traffic on TCP port 443
A.
Use inbound rule 100 to allow traffic on TCP port 443 Use inbound rule 200 to deny traffic on TCP port 3306 Use outbound rule 100 to allow traffic on TCP port 443
Answers
B.
Use inbound rule 100 to deny traffic on TCP port 3306. Use inbound rule 200 to allow traffic on TCP port range 1024-65535. Use outbound rule 100 to allow traffic on TCP port 443
B.
Use inbound rule 100 to deny traffic on TCP port 3306. Use inbound rule 200 to allow traffic on TCP port range 1024-65535. Use outbound rule 100 to allow traffic on TCP port 443
Answers
C.
Use inbound rule 100 to allow traffic on TCP port range 1024-65535 Use inbound rule 200 to deny traffic on TCP port 3306 Use outbound rule 100 to allow traffic on TCP port 443
C.
Use inbound rule 100 to allow traffic on TCP port range 1024-65535 Use inbound rule 200 to deny traffic on TCP port 3306 Use outbound rule 100 to allow traffic on TCP port 443
Answers
D.
Use inbound rule 100 to deny traffic on TCP port 3306 Use inbound rule 200 to allow traffic on TCP port 443 Use outbound rule 100 to allow traffic on TCP port 443
D.
Use inbound rule 100 to deny traffic on TCP port 3306 Use inbound rule 200 to allow traffic on TCP port 443 Use outbound rule 100 to allow traffic on TCP port 443
Answers
Suggested answer: A

A company is hosting a static website on Amazon S3 The company has configured an Amazon CloudFront distribution to serve the website contents The company has associated an AWS WAF web ACL with the CloudFront distribution. The web ACL ensures that requests originate from the United States to address compliance restrictions.

THE company is worried that the S3 URL might still be accessible directly and that requests can bypass the CloudFront distribution Which combination of steps should the company take to remove direct access to the S3 URL? (Select TWO. )

A.
Select "Restrict Bucket Access" in the origin settings of the CloudFront distribution
A.
Select "Restrict Bucket Access" in the origin settings of the CloudFront distribution
Answers
B.
Create an origin access identity (OAI) for the S3 origin
B.
Create an origin access identity (OAI) for the S3 origin
Answers
C.
Update the S3 bucket policy to allow s3 GetObject with a condition that the aws Referer key matches the secret value Deny all other requests
C.
Update the S3 bucket policy to allow s3 GetObject with a condition that the aws Referer key matches the secret value Deny all other requests
Answers
D.
Configure the S3 bucket poky so that only the origin access identity (OAI) has read permission for objects in the bucket
D.
Configure the S3 bucket poky so that only the origin access identity (OAI) has read permission for objects in the bucket
Answers
E.
Add an origin custom header that has the name Referer to the CloudFront distribution Give the header a secret value.
E.
Add an origin custom header that has the name Referer to the CloudFront distribution Give the header a secret value.
Answers
Suggested answer: A, D

A company's security team is building a solution for logging and visualization. The solution will assist the company with the large variety and velocity of data that it receives from AWS across multiple accounts. The security team has enabled AWS CloudTrail and VPC Flow Logs in all of its accounts In addition, the company has an organization in AWS Organizations and has an AWS Security Hub master account. The security team wants to use Amazon Detective However the security team cannot enable Detective and is unsure why What must the security team do to enable Detective?

A.
Enable Amazon Macie so that Secunty H jb will allow Detective to process findings from Macie.
A.
Enable Amazon Macie so that Secunty H jb will allow Detective to process findings from Macie.
Answers
B.
Disable AWS Key Management Service (AWS KMS) encryption on CtoudTrail logs in every member account of the organization
B.
Disable AWS Key Management Service (AWS KMS) encryption on CtoudTrail logs in every member account of the organization
Answers
C.
Enable Amazon GuardDuty on all member accounts Try to enable Detective in 48 hours
C.
Enable Amazon GuardDuty on all member accounts Try to enable Detective in 48 hours
Answers
D.
Ensure that the principal that launches Detective has the organizations ListAccounts permission
D.
Ensure that the principal that launches Detective has the organizations ListAccounts permission
Answers
Suggested answer: D

An application team wants to use AWS Certificate Manager (ACM) to request public certificates to ensure that data is secured in transit. The domains that are being used are not currently hosted on Amazon Route 53 The application team wants to use an AWS managed distribution and caching solution to optimize requests to its systems and provide better points of presence to customers The distribution solution will use a primary domain name that is customized The distribution solution also will use several alternative domain names The certificates must renew automatically over an indefinite period of time Which combination of steps should the application team take to deploy this architecture? (Select THREE.)

A.
Request a certificate (torn ACM in the us-west-2 Region Add the domain names that the certificate will secure
A.
Request a certificate (torn ACM in the us-west-2 Region Add the domain names that the certificate will secure
Answers
B.
Send an email message to the domain administrators to request vacation of the domains for ACM
B.
Send an email message to the domain administrators to request vacation of the domains for ACM
Answers
C.
Request validation of the domains for ACM through DNS Insert CNAME records into each domain's DNS zone
C.
Request validation of the domains for ACM through DNS Insert CNAME records into each domain's DNS zone
Answers
D.
Create an Application Load Balancer for me caching solution Select the newly requested certificate from ACM to be used for secure connections
D.
Create an Application Load Balancer for me caching solution Select the newly requested certificate from ACM to be used for secure connections
Answers
E.
Create an Amazon CloudFront distribution for the caching solution Enter the main CNAME record as the Origin Name Enter the subdomain names or alternate names in the Alternate Domain Names Distribution Settings Select the newly requested certificate from ACM to be used for secure connections
E.
Create an Amazon CloudFront distribution for the caching solution Enter the main CNAME record as the Origin Name Enter the subdomain names or alternate names in the Alternate Domain Names Distribution Settings Select the newly requested certificate from ACM to be used for secure connections
Answers
F.
Request a certificate from ACM in the us-east-1 Region Add the domain names that the certificate wil secure
F.
Request a certificate from ACM in the us-east-1 Region Add the domain names that the certificate wil secure
Answers
Suggested answer: C, D, F

A security engineer needs to create an AWS Key Management Service <AWS KMS) key that will De used to encrypt all data stored in a company’s Amazon S3 Buckets in the us-west-1 Region. The key will use server-side encryption. Usage of the key must be limited to requests coming from Amazon S3 within the company's account.

Which statement in the KMS key policy will meet these requirements?

A.
A.
Answers
B.
B.
Answers
C.
C.
Answers
Suggested answer: C

A business requires a forensic logging solution for hundreds of Docker-based apps running on Amazon EC2. The solution must analyze logs in real time, provide message replay, and persist logs. Which Amazon Web Offerings (AWS) services should be employed to satisfy these requirements?

(Select two.)

A.
Amazon Athena
A.
Amazon Athena
Answers
B.
Amazon Kinesis
B.
Amazon Kinesis
Answers
C.
Amazon SQS
C.
Amazon SQS
Answers
D.
Amazon Elasticsearch
D.
Amazon Elasticsearch
Answers
E.
Amazon EMR
E.
Amazon EMR
Answers
Suggested answer: B, D

Within a VPC, a corporation runs an Amazon RDS Multi-AZ DB instance. The database instance is connected to the internet through a NAT gateway via two subnets. Additionally, the organization has application servers that are hosted on Amazon EC2 instances and use the RDS database. These EC2 instances have been deployed onto two more private subnets inside the same VPC. These EC2 instances connect to the internet through a default route via the same NAT gateway. Each VPC subnet has its own route table. The organization implemented a new security requirement after a recent security examination.

Never allow the database instance to connect to the internet. A security engineer must perform this update promptly without interfering with the network traffic of the application servers. How will the security engineer be able to comply with these requirements?

A.
Remove the existing NAT gateway. Create a new NAT gateway that only the application server subnets can use.
A.
Remove the existing NAT gateway. Create a new NAT gateway that only the application server subnets can use.
Answers
B.
Configure the DB instance ?€™s inbound network ACL to deny traffic from the security group ID of the NAT gateway.
B.
Configure the DB instance ?€™s inbound network ACL to deny traffic from the security group ID of the NAT gateway.
Answers
C.
Modify the route tables of the DB instance subnets to remove the default route to the NAT gateway.
C.
Modify the route tables of the DB instance subnets to remove the default route to the NAT gateway.
Answers
D.
Configure the route table of the NAT gateway to deny connections to the DB instance subnets.
D.
Configure the route table of the NAT gateway to deny connections to the DB instance subnets.
Answers
Suggested answer: C

Explanation:

Each subnet has a route table, so modify the routing associated with DB instance subnets to prevent internet access.

A development team is attempting to encrypt and decode a secure string parameter from the AWS Systems Manager Parameter Store using an AWS Key Management Service (AWS KMS) CMK. However, each attempt results in an error message being sent to the development team.

Which CMK-related problems possibly account for the error? (Select two.)

A.
The CMK is used in the attempt does not exist.
A.
The CMK is used in the attempt does not exist.
Answers
B.
The CMK is used in the attempt needs to be rotated.
B.
The CMK is used in the attempt needs to be rotated.
Answers
C.
The CMK is used in the attempt is using the CMK ?€™s key ID instead of the CMK ARN.
C.
The CMK is used in the attempt is using the CMK ?€™s key ID instead of the CMK ARN.
Answers
D.
The CMK is used in the attempt is not enabled.
D.
The CMK is used in the attempt is not enabled.
Answers
E.
The CMK is used in the attempt is using an alias.
E.
The CMK is used in the attempt is using an alias.
Answers
Suggested answer: A, D

Explanation:

https://docs.aws.amazon.com/kms/latest/developerguide/services-parameterstore.html#parameter-store-cmk-fail

Total 590 questions
Go to page: of 59