ExamGecko
Home Home / Amazon / SCS-C01

Amazon SCS-C01 Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











A company's Developers plan to migrate their on-premises applications to Amazon EC2 instances running Amazon Linux AMIs. The applications are accessed by a group of partner companies The Security Engineer needs to implement the following host-based security measures for these instances:

• Block traffic from documented known bad IP addresses

• Detect known software vulnerabilities and CIS Benchmarks compliance.

Which solution addresses these requirements?

A.
Launch the EC2 instances with an IAM role attached. Include a user data script that uses the AWS CLI to retrieve the list of bad IP addresses from AWS Secrets Manager and uploads it as a threat list in Amazon GuardDuty Use Amazon Inspector to scan the instances for known software vulnerabilities and CIS Benchmarks compliance
A.
Launch the EC2 instances with an IAM role attached. Include a user data script that uses the AWS CLI to retrieve the list of bad IP addresses from AWS Secrets Manager and uploads it as a threat list in Amazon GuardDuty Use Amazon Inspector to scan the instances for known software vulnerabilities and CIS Benchmarks compliance
Answers
B.
Launch the EC2 instances with an IAM role attached Include a user data script that uses the AWS CLl to create NACLs blocking ingress traffic from the known bad IP addresses in the EC2 instance's subnets Use AWS Systems Manager to scan the instances for known software vulnerabilities, and AWS Trusted Advisor to check instances for CIS Benchmarks compliance
B.
Launch the EC2 instances with an IAM role attached Include a user data script that uses the AWS CLl to create NACLs blocking ingress traffic from the known bad IP addresses in the EC2 instance's subnets Use AWS Systems Manager to scan the instances for known software vulnerabilities, and AWS Trusted Advisor to check instances for CIS Benchmarks compliance
Answers
C.
Launch the EC2 instances with an IAM role attached Include a user data script that uses the AWS CLl to create and attach security groups that only allow an allow listed source IP address range inbound. Use Amazon Inspector to scan the instances for known software vulnerabilities, and AWS Trusted Advisor to check instances for CIS Benchmarks compliance
C.
Launch the EC2 instances with an IAM role attached Include a user data script that uses the AWS CLl to create and attach security groups that only allow an allow listed source IP address range inbound. Use Amazon Inspector to scan the instances for known software vulnerabilities, and AWS Trusted Advisor to check instances for CIS Benchmarks compliance
Answers
D.
Launch the EC2 instances with an IAM role attached Include a user data script that creates a cron job to periodically retrieve the list of bad IP addresses from Amazon S3, and configures iptabies on the instances blocking the list of bad IP addresses Use Amazon inspector to scan the instances for known software vulnerabilities and CIS Benchmarks compliance.
D.
Launch the EC2 instances with an IAM role attached Include a user data script that creates a cron job to periodically retrieve the list of bad IP addresses from Amazon S3, and configures iptabies on the instances blocking the list of bad IP addresses Use Amazon inspector to scan the instances for known software vulnerabilities and CIS Benchmarks compliance.
Answers
Suggested answer: D

A company has an encrypted Amazon S3 bucket. An Application Developer has an IAM policy that allows access to the S3 bucket, but the Application Developer is unable to access objects within the bucket. What is a possible cause of the issue?

A.
The S3 ACL for the S3 bucket fails to explicitly grant access to the Application Developer
A.
The S3 ACL for the S3 bucket fails to explicitly grant access to the Application Developer
Answers
B.
The AWS KMS key for the S3 bucket fails to list the Application Developer as an administrator
B.
The AWS KMS key for the S3 bucket fails to list the Application Developer as an administrator
Answers
C.
The S3 bucket policy fails to explicitly grant access to the Application Developer
C.
The S3 bucket policy fails to explicitly grant access to the Application Developer
Answers
D.
The S3 bucket policy explicitly denies access to the Application Developer
D.
The S3 bucket policy explicitly denies access to the Application Developer
Answers
Suggested answer: C

A company has a VPC with several Amazon EC2 instances behind a NAT gateway. The company's security policy states that all network traffic must be logged and must include the original source and destination IP addresses. The existing VPC Flow Logs do not include this information. A security engineer needs to recommend a solution.

Which combination of steps should the security engineer recommend? (Select TWO )

A.
Edit the existing VPC Flow Logs. Change the log format of the VPC Flow Logs from the Amazon default format to a custom format.
A.
Edit the existing VPC Flow Logs. Change the log format of the VPC Flow Logs from the Amazon default format to a custom format.
Answers
B.
Delete and recreate the existing VPC Flow Logs. Change the log format of the VPC Flow Logs from the Amazon default format to a custom format.
B.
Delete and recreate the existing VPC Flow Logs. Change the log format of the VPC Flow Logs from the Amazon default format to a custom format.
Answers
C.
Change the destination to Amazon CloudWatch Logs.
C.
Change the destination to Amazon CloudWatch Logs.
Answers
D.
Include the pkt-srcaddr and pkt-dstaddr fields in the log format.
D.
Include the pkt-srcaddr and pkt-dstaddr fields in the log format.
Answers
E.
Include the subnet-id and instance-id fields in the log format.
E.
Include the subnet-id and instance-id fields in the log format.
Answers
Suggested answer: A, E

A developer is creating an AWS Lambda function that requires environment variables to store connection information and logging settings. The developer is required to use an AWS KMS Customer Master Key (CMK> supplied by the information security department in order to adhere to company standards for securing Lambda environment variables. Which of the following are required for this configuration to work? (Select TWO.)

A.
The developer must configure Lambda access to the VPC using the --vpc-config parameter.
A.
The developer must configure Lambda access to the VPC using the --vpc-config parameter.
Answers
B.
The Lambda function execution role must have the kms:Decrypt- permission added in the AWS IAM policy.
B.
The Lambda function execution role must have the kms:Decrypt- permission added in the AWS IAM policy.
Answers
C.
The KMS key policy must allow permissions for the developer to use the KMS key.
C.
The KMS key policy must allow permissions for the developer to use the KMS key.
Answers
D.
The AWS IAM policy assigned to the developer must have the kmseGcnerate-DataKcy permission added.
D.
The AWS IAM policy assigned to the developer must have the kmseGcnerate-DataKcy permission added.
Answers
E.
The Lambda execution role must have the kms:Encrypt permission added in the AWS IAM policy.
E.
The Lambda execution role must have the kms:Encrypt permission added in the AWS IAM policy.
Answers
Suggested answer: B, C

A Solutions Architect is designing a web application that uses Amazon CloudFront, an Elastic Load Balancing Application Load Balancer, and an Auto Scaling group of Amazon EC2 instances. The load balancer and EC2 instances are in the US West (Oregon) region. It has been decided that encryption in transit is necessary by using a customer-branded domain name from the client to CloudFront and from CloudFront to the load balancer. Assuming that AWS Certificate Manager is used, how many certificates will need to be generated?

A.
One in the US West (Oregon) region and one in the US East (Virginia) region.
A.
One in the US West (Oregon) region and one in the US East (Virginia) region.
Answers
B.
Two in the US West (Oregon) region and none in the US East (Virginia) region.
B.
Two in the US West (Oregon) region and none in the US East (Virginia) region.
Answers
C.
One in the US West (Oregon) region and none in the US East (Virginia) region.
C.
One in the US West (Oregon) region and none in the US East (Virginia) region.
Answers
D.
Two in the US East (Virginia) region and none in the US West (Oregon) region.
D.
Two in the US East (Virginia) region and none in the US West (Oregon) region.
Answers
Suggested answer: A

Explanation:

Why? If you want to require HTTPS between viewers and CloudFront, you must change the AWSRegion to US East (N. Virginia) in the AWS Certificate Manager console before you request or importa certificate. If you want to require HTTPS between CloudFront and your origin, and you're using anELB load balancer as your origin, you can request or import a certificate in any Region. https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/cnames-and-httpsrequirements.html

Unapproved changes were previously made to a company's Amazon S3 bucket. A security engineer configured AWS Config to record configuration changes made to the company's S3 buckets. The engineer discovers there are S3 configuration changes being made, but no Amazon SNS notifications are being sent. The engineer has already checked the configuration of the SNS topic and has confirmed the configuration is valid. Which combination of steps should the security engineer take to resolve the issue? (Select TWO.)

A.
Configure the S3 bucket ACLs to allow AWS Config to record changes to the buckets.
A.
Configure the S3 bucket ACLs to allow AWS Config to record changes to the buckets.
Answers
B.
Configure policies attached to S3 buckets to allow AWS Config to record changes to the buckets.
B.
Configure policies attached to S3 buckets to allow AWS Config to record changes to the buckets.
Answers
C.
Attach the AmazonS3ReadOnryAccess managed policy to the IAM user.
C.
Attach the AmazonS3ReadOnryAccess managed policy to the IAM user.
Answers
D.
Verify the security engineer's IAM user has an attached policy that allows all AWS Config actions.
D.
Verify the security engineer's IAM user has an attached policy that allows all AWS Config actions.
Answers
E.
Assign the AWSConfigRole managed policy to the AWS Config role
E.
Assign the AWSConfigRole managed policy to the AWS Config role
Answers
Suggested answer: B, E

A company has a serverless application for internal users deployed on AWS. The application uses AWS Lambda for the front end and for business logic. The Lambda function accesses an Amazon RDS database inside a VPC The company uses AWS Systems Manager Parameter Store for storing database credentials. A recent security review highlighted the following issues The Lambda function has internet access. The relational database is publicly accessible.

The database credentials are not stored in an encrypted state.

Which combination of steps should the company take to resolve these security issues? (Select THREE)

A.
Disable public access to the RDS database inside the VPC
A.
Disable public access to the RDS database inside the VPC
Answers
B.
Move all the Lambda functions inside the VPC.
B.
Move all the Lambda functions inside the VPC.
Answers
C.
Edit the IAM role used by Lambda to restrict internet access.
C.
Edit the IAM role used by Lambda to restrict internet access.
Answers
D.
Create a VPC endpoint for Systems Manager. Store the credentials as a string parameter. Change the parameter type to an advanced parameter.
D.
Create a VPC endpoint for Systems Manager. Store the credentials as a string parameter. Change the parameter type to an advanced parameter.
Answers
E.
Edit the IAM role used by RDS to restrict internet access.
E.
Edit the IAM role used by RDS to restrict internet access.
Answers
F.
Create a VPC endpoint for Systems Manager. Store the credentials as a SecureString parameter.
F.
Create a VPC endpoint for Systems Manager. Store the credentials as a SecureString parameter.
Answers
Suggested answer: A, B, E

A company's Security Officer is concerned about the risk of AWS account root user logins and has assigned a Security Engineer to implement a notification solution for near-real-time alerts upon account root user logins. How should the Security Engineer meet these requirements?

A.
Create a cron job that runs a script lo download the AWS IAM security credentials We. parse the file for account root user logins and email the Security team's distribution 1st
A.
Create a cron job that runs a script lo download the AWS IAM security credentials We. parse the file for account root user logins and email the Security team's distribution 1st
Answers
B.
Run AWS CloudTrail logs through Amazon CloudWatch Events to detect account roo4 user logins and trigger an AWS Lambda function to send an Amazon SNS notification to the Security team's distribution list.
B.
Run AWS CloudTrail logs through Amazon CloudWatch Events to detect account roo4 user logins and trigger an AWS Lambda function to send an Amazon SNS notification to the Security team's distribution list.
Answers
C.
Save AWS CloudTrail logs to an Amazon S3 bucket in the Security team's account Process the CloudTrail logs with the Security Engineer's logging solution for account root user logins Send an Amazon SNS notification to the Security team upon encountering the account root user login events
C.
Save AWS CloudTrail logs to an Amazon S3 bucket in the Security team's account Process the CloudTrail logs with the Security Engineer's logging solution for account root user logins Send an Amazon SNS notification to the Security team upon encountering the account root user login events
Answers
D.
Save VPC Plow Logs to an Amazon S3 bucket in the Security team's account and process the VPC Flow Logs with their logging solutions for account root user logins Send an Amazon SNS notification to the Security team upon encountering the account root user login events
D.
Save VPC Plow Logs to an Amazon S3 bucket in the Security team's account and process the VPC Flow Logs with their logging solutions for account root user logins Send an Amazon SNS notification to the Security team upon encountering the account root user login events
Answers
Suggested answer: B

A company uses HTTP Live Streaming (HLS) to stream live video content to paying subscribers byusing Amazon CloudFront. HLS splits the video content into chunks so that the user can request theright chunk based on different conditions Because the video events last for several hours, the totalvideo is made up of thousands of chunksThe origin URL is not disclosed and every user is forced to access the CloudFront URL The companyhas a web application that authenticates the paying users against an internal repository and aCloudFront key pair that is already issued.

What is the simplest and MOST effective way to protect the content?

A.
Develop the application to use the CloudFront key pair to create signed URLs that users will use to access the content.
A.
Develop the application to use the CloudFront key pair to create signed URLs that users will use to access the content.
Answers
B.
Develop the application to use the CloudFront key pair to set the signed cookies that users will use to access the content.
B.
Develop the application to use the CloudFront key pair to set the signed cookies that users will use to access the content.
Answers
C.
Develop the application to issue a security token that Lambda@Edge will receive to authenticate and authorize access to the content
C.
Develop the application to issue a security token that Lambda@Edge will receive to authenticate and authorize access to the content
Answers
D.
Keep the CloudFront URL encrypted inside the application, and use AWS KMS to resolve the URL on-the-fly after the user is authenticated.
D.
Keep the CloudFront URL encrypted inside the application, and use AWS KMS to resolve the URL on-the-fly after the user is authenticated.
Answers
Suggested answer: B

A company has the software development teams that are creating applications that store sensitive data in Amazon S3 Each team's data must always be separate. The company's security team must design a data encryption strategy for both teams that provides the ability to audit key usage. The solution must also minimize operational overhead what should me security team recommend?

A.
Tell the application teams to use two different S3 buckets with separate AWS Key Management Service (AWS KMS) AWS managed CMKs Limit the key process to allow encryption and decryption of the CMKs to their respective teams only. Force the teams to use encryption context to encrypt and decrypt
A.
Tell the application teams to use two different S3 buckets with separate AWS Key Management Service (AWS KMS) AWS managed CMKs Limit the key process to allow encryption and decryption of the CMKs to their respective teams only. Force the teams to use encryption context to encrypt and decrypt
Answers
B.
Tell the application teams to use two different S3 buckets with a single AWS Key Management Service (AWS KMS) AWS managed CMK Limit the key policy to allow encryption and decryption of the CMK only. Do not allow the teams to use encryption context to encrypt and decrypt
B.
Tell the application teams to use two different S3 buckets with a single AWS Key Management Service (AWS KMS) AWS managed CMK Limit the key policy to allow encryption and decryption of the CMK only. Do not allow the teams to use encryption context to encrypt and decrypt
Answers
C.
Tell the application teams to use two different S3 buckets with separate AWS Key Management Service (AWS KMS) customer managed CMKs Limit the key policies to allow encryption and decryption of the CMKs to their respective teams only Force the teams to use encryption context to encrypt and decrypt
C.
Tell the application teams to use two different S3 buckets with separate AWS Key Management Service (AWS KMS) customer managed CMKs Limit the key policies to allow encryption and decryption of the CMKs to their respective teams only Force the teams to use encryption context to encrypt and decrypt
Answers
D.
Tell the application teams to use two different S3 buckets with a single AWS Key Management Service (AWS KMS) customer managed CMK Limit the key policy to allow encryption and decryption of the CMK only Do not allow the teams to use encryption context to encrypt and decrypt
D.
Tell the application teams to use two different S3 buckets with a single AWS Key Management Service (AWS KMS) customer managed CMK Limit the key policy to allow encryption and decryption of the CMK only Do not allow the teams to use encryption context to encrypt and decrypt
Answers
Suggested answer: A
Total 590 questions
Go to page: of 59