ExamGecko
Home Home / Amazon / SCS-C01

Amazon SCS-C01 Practice Test - Questions Answers, Page 9

Question list
Search
Search

List of questions

Search

Related questions











A company has several workloads running on AWS. Employees are required to authenticate using onpremises ADFS and SSO to access the AWS Management Console. Developers migrated an existing legacy web application to an Amazon EC2 instance.

Employees need to access this application from anywhere on the internet, but currently, there is no authentication system built into the application. How should the Security Engineer implement employee-only access to this system without changing the application?

A.
Place the application behind an Application Load Balancer (ALB). Use Amazon Cognito as authentication for the ALB. Define a SAML-based Amazon Cognito user pool and connect it to ADFS.
A.
Place the application behind an Application Load Balancer (ALB). Use Amazon Cognito as authentication for the ALB. Define a SAML-based Amazon Cognito user pool and connect it to ADFS.
Answers
B.
Implement AWS SSO in the master account and link it to ADFS as an identity provider. Define the EC2 instance as a managed resource, then apply an IAM policy on the resource.
B.
Implement AWS SSO in the master account and link it to ADFS as an identity provider. Define the EC2 instance as a managed resource, then apply an IAM policy on the resource.
Answers
C.
Define an Amazon Cognito identity pool, then install the connector on the Active Directory server. Use the Amazon Cognito SDK on the application instance to authenticate the employees using their Active Directory user names and passwords.
C.
Define an Amazon Cognito identity pool, then install the connector on the Active Directory server. Use the Amazon Cognito SDK on the application instance to authenticate the employees using their Active Directory user names and passwords.
Answers
D.
Create an AWS Lambda custom authorizer as the authenticator for a reverse proxy on Amazon EC2. Ensure the security group on Amazon EC2 only allows access from the Lambda function.
D.
Create an AWS Lambda custom authorizer as the authenticator for a reverse proxy on Amazon EC2. Ensure the security group on Amazon EC2 only allows access from the Lambda function.
Answers
Suggested answer: A

Explanation:

https://docs.aws.amazon.com/elasticloadbalancing/latest/application/listener-authenticateusers.html

- Authenticate users through social IdPs, such as Amazon, Facebook, or Google, through the user pools supported by Amazon Cognito.

- Authenticate users through corporate identities, using SAML, LDAP, or Microsoft AD, through the user pools supported by Amazon Cognito.

A Security Engineer for a large company is managing a data processing application used by 1,500 subsidiary companies. The parent and subsidiary companies all use AWS. The application uses TCP port 443 and runs on Amazon EC2 behind a Network Load Balancer (NLB). For compliance reasons, the application should only be accessible to the subsidiaries and should not be available on the public internet. To meet the compliance requirements for restricted access, the Engineer has received the public and private CIDR block ranges for each subsidiary What solution should the Engineer use to implement the appropriate access restrictions for the application?

A.
Create a NACL to allow access on TCP port 443 from the 1;500 subsidiary CIDR block ranges.Associate the NACL to both the NLB and EC2 instances
A.
Create a NACL to allow access on TCP port 443 from the 1;500 subsidiary CIDR block ranges.Associate the NACL to both the NLB and EC2 instances
Answers
B.
Create an AWS security group to allow access on TCP port 443 from the 1,500 subsidiary CIDR block ranges. Associate the security group to the NLB. Create a second security group for EC2 instances with access on TCP port 443 from the NLB security group.
B.
Create an AWS security group to allow access on TCP port 443 from the 1,500 subsidiary CIDR block ranges. Associate the security group to the NLB. Create a second security group for EC2 instances with access on TCP port 443 from the NLB security group.
Answers
C.
Create an AWS PrivateLink endpoint service in the parent company account attached to the NLB.Create an AWS security group for the instances to allow access on TCP port 443 from the AWS PrivateLink endpoint. Use AWS PrivateLink interface endpoints in the 1,500 subsidiary AWS accounts to connect to the data processing application.
C.
Create an AWS PrivateLink endpoint service in the parent company account attached to the NLB.Create an AWS security group for the instances to allow access on TCP port 443 from the AWS PrivateLink endpoint. Use AWS PrivateLink interface endpoints in the 1,500 subsidiary AWS accounts to connect to the data processing application.
Answers
D.
Create an AWS security group to allow access on TCP port 443 from the 1,500 subsidiary CIDR block ranges. Associate the security group with EC2 instances.
D.
Create an AWS security group to allow access on TCP port 443 from the 1,500 subsidiary CIDR block ranges. Associate the security group with EC2 instances.
Answers
Suggested answer: D

A company's Director of information Security wants a daily email report from AWS that contains recommendations for each company account to meet AWS Security best practices. Which solution would meet these requirements?

A.
in every AWS account, configure AWS Lambda to query me AWS Support API tor AWS Trusted Advisor security checks Send the results from Lambda to an Amazon SNS topic to send reports.
A.
in every AWS account, configure AWS Lambda to query me AWS Support API tor AWS Trusted Advisor security checks Send the results from Lambda to an Amazon SNS topic to send reports.
Answers
B.
Configure Amazon GuardDuty in a master account and invite all other accounts to be managed by the master account Use GuardDuty's integration with Amazon SNS to report on findings
B.
Configure Amazon GuardDuty in a master account and invite all other accounts to be managed by the master account Use GuardDuty's integration with Amazon SNS to report on findings
Answers
C.
Use Amazon Athena and Amazon QuickSight to build reports off of AWS CloudTrail Create a daily Amazon CloudWatch trigger to run the report dally and email It using Amazon SNS
C.
Use Amazon Athena and Amazon QuickSight to build reports off of AWS CloudTrail Create a daily Amazon CloudWatch trigger to run the report dally and email It using Amazon SNS
Answers
D.
Use AWS Artifact's prebuilt reports and subscriptions Subscribe the Director of Information Security to the reports by adding the Director as the security alternate contact tor each account
D.
Use AWS Artifact's prebuilt reports and subscriptions Subscribe the Director of Information Security to the reports by adding the Director as the security alternate contact tor each account
Answers
Suggested answer: A


A company has decided to migrate sensitive documents from on-premises data centers to Amazon S3. Currently, the hard drives are encrypted to meet a compliance requirement regarding data encryption. The CISO wants to improve security by encrypting each file using a different key instead of a single key. Using a different key would limit the security impact of a single exposed key. Which of the following requires the LEAST amount of configuration when implementing this approach?

A.
Place each file into a different S3 bucket. Set the default encryption of each bucket to use a different AWS KMS customer managed key.
A.
Place each file into a different S3 bucket. Set the default encryption of each bucket to use a different AWS KMS customer managed key.
Answers
B.
Put all the files in the same S3 bucket. Using S3 events as a trigger, write an AWS Lambda function to encrypt each file as it is added using different AWS KMS data keys.
B.
Put all the files in the same S3 bucket. Using S3 events as a trigger, write an AWS Lambda function to encrypt each file as it is added using different AWS KMS data keys.
Answers
C.
Use the S3 encryption client to encrypt each file individually using S3-generated data keys
C.
Use the S3 encryption client to encrypt each file individually using S3-generated data keys
Answers
D.
Place all the files in the same S3 bucket. Use server-side encryption with AWS KMS-managed keys(SSE-KMS) to encrypt the data
D.
Place all the files in the same S3 bucket. Use server-side encryption with AWS KMS-managed keys(SSE-KMS) to encrypt the data
Answers
Suggested answer: D

Explanation:

References:

https://docs.aws.amazon.com/AmazonS3/latest/dev/serv-side-encryption.htmlServer-Side Encryption with Amazon S3-Managed Keys (SSE-S3) When you use Server-SideEncryption with Amazon S3-Managed Keys (SSE-S3), each object is encrypted with a unique key.

Server-Side Encryption with Customer Master Keys (CMKs) Stored in AWS Key Management Service

(SSE-KMS) is similar to SSE-S3, but with some additional benefits and charges for using this service.

When you use SSE-KMS to protect your data without an S3 Bucket Key, Amazon S3 uses an individual AWS KMS data key for every object. It makes a call to AWS KMS every time a request is made against a KMS-encrypted object. https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-key.html

https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html

A company uses Microsoft Active Directory for access management for on-premises resources and wants to use the same mechanism for accessing its AWS accounts. Additionally, the development team plans to launch a public-facing application for which they need a separate authentication solution.

When coma nation of the following would satisfy these requirements? (Select TWO)

A.
Set up domain controllers on Amazon EC2 to extend the on-premises directory to AWS
A.
Set up domain controllers on Amazon EC2 to extend the on-premises directory to AWS
Answers
B.
Establish network connectivity between on-premises and the user's VPC
B.
Establish network connectivity between on-premises and the user's VPC
Answers
C.
Use Amazon Cognito user pools for application authentication
C.
Use Amazon Cognito user pools for application authentication
Answers
D.
Use AD Connector tor application authentication.
D.
Use AD Connector tor application authentication.
Answers
E.
Set up federated sign-in to AWS through ADFS and SAML.
E.
Set up federated sign-in to AWS through ADFS and SAML.
Answers
Suggested answer: C, D

A Security Administrator at a university is configuring a fleet of Amazon EC2 instances. The EC2 instances are shared among students, and non-root SSH access is allowed. The Administrator is concerned about students attacking other AWS account resources by using the EC2 instance metadata service.

What can the Administrator do to protect against this potential attack?

A.
Disable the EC2 instance metadata service.
A.
Disable the EC2 instance metadata service.
Answers
B.
Log all student SSH interactive session activity.
B.
Log all student SSH interactive session activity.
Answers
C.
Implement ip tables-based restrictions on the instances.
C.
Implement ip tables-based restrictions on the instances.
Answers
D.
Install the Amazon Inspector agent on the instances.
D.
Install the Amazon Inspector agent on the instances.
Answers
Suggested answer: A

Explanation:

"To turn off access to instance metadata on an existing instance....."

https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/configuring-instance-metadataservice.html You can disable the service for existing (running or stopped) ec2 instances. https://docs.aws.amazon.com/cli/latest/reference/ec2/modify-instance-metadata-options.html

While securing the connection between a company's VPC and its on-premises data center, a Security Engineer sent a ping command from an on-premises host (IP address 203.0.113.12) to an Amazon EC2 instance (IP address 172.31.16.139). The ping command did not return a response. The flow log in the VPC showed the following:

2 123456789010 eni-1235b8ca 203.0.113.12 172.31.16.139 0 0 1 4 336 1432917027 1432917142 ACCEPT OK 2 123456789010 eni-1235b8ca 172.31.16.139 203.0.113.12 0 0 1 4 336 1432917094 1432917142 REJECT OK What action should be performed to allow the ping to work?

A.
In the security group of the EC2 instance, allow inbound ICMP traffic.
A.
In the security group of the EC2 instance, allow inbound ICMP traffic.
Answers
B.
In the security group of the EC2 instance, allow outbound ICMP traffic.
B.
In the security group of the EC2 instance, allow outbound ICMP traffic.
Answers
C.
In the VPC's NACL, allow inbound ICMP traffic.
C.
In the VPC's NACL, allow inbound ICMP traffic.
Answers
D.
In the VPC's NACL, allow outbound ICMP traffic.
D.
In the VPC's NACL, allow outbound ICMP traffic.
Answers
Suggested answer: D

A global company must mitigate and respond to DDoS attacks at Layers 3, 4 and 7 All of the company's AWS applications are serverless with static content hosted on Amazon S3 using Amazon CloudFront and Amazon Route 53 Which solution will meet these requirements?

A.
Use AWS WAF with an upgrade to the AWS Business support plan
A.
Use AWS WAF with an upgrade to the AWS Business support plan
Answers
B.
Use AWS Certificate Manager with an Application Load Balancer configured with an origin access identity
B.
Use AWS Certificate Manager with an Application Load Balancer configured with an origin access identity
Answers
C.
Use AWS Shield Advanced
C.
Use AWS Shield Advanced
Answers
D.
Use AWS WAF to protect AWS Lambda functions encrypted with AWS KMS and a NACL restricting all Ingress traffic
D.
Use AWS WAF to protect AWS Lambda functions encrypted with AWS KMS and a NACL restricting all Ingress traffic
Answers
Suggested answer: C

A financial institution has the following security requirements:

Cloud-based users must be contained in a separate authentication domain.

Cloud-based users cannot access on-premises systems.

As part of standing up a cloud environment, the financial institution is creating a number of Amazon managed databases and Amazon EC2 instances. An Active Directory service exists on-premises that has all the administrator accounts, and these must be able to access the databases and instances.

How would the organization manage its resources in the MOST secure manner? (Choose two.)

A.
Configure an AWS Managed Microsoft AD to manage the cloud resources.
A.
Configure an AWS Managed Microsoft AD to manage the cloud resources.
Answers
B.
Configure an additional on-premises Active Directory service to manage the cloud resources.
B.
Configure an additional on-premises Active Directory service to manage the cloud resources.
Answers
C.
Establish a one-way trust relationship from the existing Active Directory to the new Active Directory service.
C.
Establish a one-way trust relationship from the existing Active Directory to the new Active Directory service.
Answers
D.
Establish a one-way trust relationship from the new Active Directory to the existing Active Directory service.
D.
Establish a one-way trust relationship from the new Active Directory to the existing Active Directory service.
Answers
E.
Establish a two-way trust between the new and existing Active Directory services.
E.
Establish a two-way trust between the new and existing Active Directory services.
Answers
Suggested answer: A, D

Explanation:

Deploy a new forest/domain on AWS with one-way trust. If you are planning on leveraging credentials from an on-premises AD on AWS member servers, you must establish at least a one-way trust to the Active Directory running on AWS. In this model, the AWS domain becomes the resource domain where computer objects are located and on-premises domain becomes the account domain. Ref: https://d1.awsstatic.com/whitepapers/adds-on-aws.pdf

https://docs.aws.amazon.com/directoryservice/latest/admin-guide/directory_microsoft_ad.html

A security engineer is asked to update an AW3 CoudTrail log file prefix for an existing trail. When attempting to save the change in the CloudTrail console, the security engineer receives the following error message. "There is a problem with the bucket policy'' What will enable the security engineer to saw the change?

A.
Create a new trail with the updated log file prefix, and then delete the original nail Update the existing bucket policy in the Amazon S3 console with the new log the prefix, and then update the log file prefix in the CloudTrail console
A.
Create a new trail with the updated log file prefix, and then delete the original nail Update the existing bucket policy in the Amazon S3 console with the new log the prefix, and then update the log file prefix in the CloudTrail console
Answers
B.
Update the existing bucket policy in the Amazon S3 console to allow the security engineers principal to perform PutBucketPolicy. and then update the log file prefix in the CloudTrail console
B.
Update the existing bucket policy in the Amazon S3 console to allow the security engineers principal to perform PutBucketPolicy. and then update the log file prefix in the CloudTrail console
Answers
C.
Update the existing bucket policy in the Amazon S3 console with the new log file prefix, and then update the log file prefix in the CloudTrail console.
C.
Update the existing bucket policy in the Amazon S3 console with the new log file prefix, and then update the log file prefix in the CloudTrail console.
Answers
D.
Update the existing bucket policy in the Amazon S3 console to allow the security engineers principal to perform GetBucketPolicy, and then update the log file prefix in the CloudTrail console
D.
Update the existing bucket policy in the Amazon S3 console to allow the security engineers principal to perform GetBucketPolicy, and then update the log file prefix in the CloudTrail console
Answers
Suggested answer: C

Explanation:

https://docs.aws.amazon.com/awscloudtrail/latest/userguide/create-s3-bucket-policy-forcloudtrail.html#cloudtrail-add-change-or-remove-a-bucket-prefix

Total 590 questions
Go to page: of 59