ExamGecko
Home Home / Amazon / SCS-C02

Amazon SCS-C02 Practice Test - Questions Answers, Page 12

Question list
Search
Search

List of questions

Search

Related questions











A company is hosting a static website on Amazon S3 The company has configured an Amazon CloudFront distribution to serve the website contents The company has associated an IAM WAF web ACL with the CloudFront distribution. The web ACL ensures that requests originate from the United States to address compliance restrictions.

THE company is worried that the S3 URL might still be accessible directly and that requests can bypass the CloudFront distribution

Which combination of steps should the company take to remove direct access to the S3 URL? (Select TWO. )

A.
Select 'Restrict Bucket Access' in the origin settings of the CloudFront distribution
A.
Select 'Restrict Bucket Access' in the origin settings of the CloudFront distribution
Answers
B.
Create an origin access identity (OAI) for the S3 origin
B.
Create an origin access identity (OAI) for the S3 origin
Answers
C.
Update the S3 bucket policy to allow s3 GetObject with a condition that the IAM Referer key matches the secret value Deny all other requests
C.
Update the S3 bucket policy to allow s3 GetObject with a condition that the IAM Referer key matches the secret value Deny all other requests
Answers
D.
Configure the S3 bucket poky so that only the origin access identity (OAI) has read permission for objects in the bucket
D.
Configure the S3 bucket poky so that only the origin access identity (OAI) has read permission for objects in the bucket
Answers
E.
Add an origin custom header that has the name Referer to the CloudFront distribution Give the header a secret value.
E.
Add an origin custom header that has the name Referer to the CloudFront distribution Give the header a secret value.
Answers
Suggested answer: A, D

A company's security team is building a solution for logging and visualization. The solution will assist the company with the large variety and velocity of data that it receives from IAM across multiple accounts. The security team has enabled IAM CloudTrail and VPC Flow Logs in all of its accounts. In addition, the company has an organization in IAM Organizations and has an IAM Security Hub master account.

The security team wants to use Amazon Detective However the security team cannot enable Detective and is unsure why

What must the security team do to enable Detective?

A.
Enable Amazon Macie so that Secunty H jb will allow Detective to process findings from Macie.
A.
Enable Amazon Macie so that Secunty H jb will allow Detective to process findings from Macie.
Answers
B.
Disable IAM Key Management Service (IAM KMS) encryption on CtoudTrail logs in every member account of the organization
B.
Disable IAM Key Management Service (IAM KMS) encryption on CtoudTrail logs in every member account of the organization
Answers
C.
Enable Amazon GuardDuty on all member accounts Try to enable Detective in 48 hours
C.
Enable Amazon GuardDuty on all member accounts Try to enable Detective in 48 hours
Answers
D.
Ensure that the principal that launches Detective has the organizations ListAccounts permission
D.
Ensure that the principal that launches Detective has the organizations ListAccounts permission
Answers
Suggested answer: D

An application team wants to use IAM Certificate Manager (ACM) to request public certificates to ensure that data is secured in transit. The domains that are being used are not currently hosted on Amazon Route 53

The application team wants to use an IAM managed distribution and caching solution to optimize requests to its systems and provide better points of presence to customers The distribution solution will use a primary domain name that is customized The distribution solution also will use several alternative domain names The certificates must renew automatically over an indefinite period of time

Which combination of steps should the application team take to deploy this architecture? (Select THREE.)

A.
Request a certificate (torn ACM in the us-west-2 Region Add the domain names that the certificate will secure
A.
Request a certificate (torn ACM in the us-west-2 Region Add the domain names that the certificate will secure
Answers
B.
Send an email message to the domain administrators to request vacation of the domains for ACM
B.
Send an email message to the domain administrators to request vacation of the domains for ACM
Answers
C.
Request validation of the domains for ACM through DNS Insert CNAME records into each domain's DNS zone
C.
Request validation of the domains for ACM through DNS Insert CNAME records into each domain's DNS zone
Answers
D.
Create an Application Load Balancer for me caching solution Select the newly requested certificate from ACM to be used for secure connections
D.
Create an Application Load Balancer for me caching solution Select the newly requested certificate from ACM to be used for secure connections
Answers
E.
Create an Amazon CloudFront distribution for the caching solution Enter the main CNAME record as the Origin Name Enter the subdomain names or alternate names in the Alternate Domain Names Distribution Settings Select the newly requested certificate from ACM to be used for secure connections
E.
Create an Amazon CloudFront distribution for the caching solution Enter the main CNAME record as the Origin Name Enter the subdomain names or alternate names in the Alternate Domain Names Distribution Settings Select the newly requested certificate from ACM to be used for secure connections
Answers
F.
Request a certificate from ACM in the us-east-1 Region Add the domain names that the certificate wil secure
F.
Request a certificate from ACM in the us-east-1 Region Add the domain names that the certificate wil secure
Answers
Suggested answer: C, D, F

A security engineer needs to create an IAM Key Management Service <IAM KMS) key that will De used to encrypt all data stored in a company's Amazon S3 Buckets in the us-west-1 Region. The key will use server-side encryption. Usage of the key must be limited to requests coming from Amazon S3 within the company's account.

Which statement in the KMS key policy will meet these requirements?

A)

B)

C)

A.
Option A
A.
Option A
Answers
B.
Option B
B.
Option B
Answers
C.
Option C
C.
Option C
Answers
Suggested answer: A

A business requires a forensic logging solution for hundreds of Docker-based apps running on Amazon EC2. The solution must analyze logs in real time, provide message replay, and persist logs.

Which Amazon Web Offerings (IAM) services should be employed to satisfy these requirements? (Select two.)

A.
Amazon Athena
A.
Amazon Athena
Answers
B.
Amazon Kinesis
B.
Amazon Kinesis
Answers
C.
Amazon SQS
C.
Amazon SQS
Answers
D.
Amazon Elasticsearch
D.
Amazon Elasticsearch
Answers
E.
Amazon EMR
E.
Amazon EMR
Answers
Suggested answer: B, D

Within a VPC, a corporation runs an Amazon RDS Multi-AZ DB instance. The database instance is connected to the internet through a NAT gateway via two subnets.

Additionally, the organization has application servers that are hosted on Amazon EC2 instances and use the RDS database. These EC2 instances have been deployed onto two more private subnets inside the same VPC. These EC2 instances connect to the internet through a default route via the same NAT gateway. Each VPC subnet has its own route table.

The organization implemented a new security requirement after a recent security examination. Never allow the database instance to connect to the internet. A security engineer must perform this update promptly without interfering with the network traffic of the application servers.

How will the security engineer be able to comply with these requirements?

A.
Remove the existing NAT gateway. Create a new NAT gateway that only the application server subnets can use.
A.
Remove the existing NAT gateway. Create a new NAT gateway that only the application server subnets can use.
Answers
B.
Configure the DB instances inbound network ACL to deny traffic from the security group ID of the NAT gateway.
B.
Configure the DB instances inbound network ACL to deny traffic from the security group ID of the NAT gateway.
Answers
C.
Modify the route tables of the DB instance subnets to remove the default route to the NAT gateway.
C.
Modify the route tables of the DB instance subnets to remove the default route to the NAT gateway.
Answers
D.
Configure the route table of the NAT gateway to deny connections to the DB instance subnets.
D.
Configure the route table of the NAT gateway to deny connections to the DB instance subnets.
Answers
Suggested answer: C

Explanation:

Each subnet has a route table, so modify the routing associated with DB instance subnets to prevent internet access.

A development team is attempting to encrypt and decode a secure string parameter from the IAM Systems Manager Parameter Store using an IAM Key Management Service (IAM KMS) CMK. However, each attempt results in an error message being sent to the development team.

Which CMK-related problems possibly account for the error? (Select two.)

A.
The CMK is used in the attempt does not exist.
A.
The CMK is used in the attempt does not exist.
Answers
B.
The CMK is used in the attempt needs to be rotated.
B.
The CMK is used in the attempt needs to be rotated.
Answers
C.
The CMK is used in the attempt is using the CMKs key ID instead of the CMK ARN.
C.
The CMK is used in the attempt is using the CMKs key ID instead of the CMK ARN.
Answers
D.
The CMK is used in the attempt is not enabled.
D.
The CMK is used in the attempt is not enabled.
Answers
E.
The CMK is used in the attempt is using an alias.
E.
The CMK is used in the attempt is using an alias.
Answers
Suggested answer: A, D

Explanation:

https://docs.IAM.amazon.com/kms/latest/developerguide/services-parameter-store.html#parameter-store-cmk-fail

A business stores website images in an Amazon S3 bucket. The firm serves the photos to end users through Amazon CloudFront. The firm learned lately that the photographs are being accessible from nations in which it does not have a distribution license.

Which steps should the business take to safeguard the photographs and restrict their distribution? (Select two.)

A.
Update the S3 bucket policy to restrict access to a CloudFront origin access identity (OAI).
A.
Update the S3 bucket policy to restrict access to a CloudFront origin access identity (OAI).
Answers
B.
Update the website DNS record to use an Amazon Route 53 geolocation record deny list of countries where the company lacks a license.
B.
Update the website DNS record to use an Amazon Route 53 geolocation record deny list of countries where the company lacks a license.
Answers
C.
Add a CloudFront geo restriction deny list of countries where the company lacks a license.
C.
Add a CloudFront geo restriction deny list of countries where the company lacks a license.
Answers
D.
Update the S3 bucket policy with a deny list of countries where the company lacks a license.
D.
Update the S3 bucket policy with a deny list of countries where the company lacks a license.
Answers
E.
Enable the Restrict Viewer Access option in CloudFront to create a deny list of countries where the company lacks a license.
E.
Enable the Restrict Viewer Access option in CloudFront to create a deny list of countries where the company lacks a license.
Answers
Suggested answer: A, C

Explanation:

For Enable Geo-Restriction, choose Yes. For Restriction Type, choose Whitelist to allow access to certain countries, or choose Blacklist to block access from certain countries. https://IAM.amazon.com/premiumsupport/knowledge-center/cloudfront-geo-restriction/

A company has multiple departments. Each department has its own IAM account. All these accounts belong to the same organization in IAM Organizations.

A large .csv file is stored in an Amazon S3 bucket in the sales department's IAM account. The company wants to allow users from the other accounts to access the .csv file's content through the combination of IAM Glue and Amazon Athen a. However, the company does not want to allow users from the other accounts to access other files in the same folder.

Which solution will meet these requirements?

A.
Apply a user policy in the other accounts to allow IAM Glue and Athena lo access the .csv We.
A.
Apply a user policy in the other accounts to allow IAM Glue and Athena lo access the .csv We.
Answers
B.
Use S3 Select to restrict access to the .csv lie. In IAM Glue Data Catalog, use S3 Select as the source of the IAM Glue database.
B.
Use S3 Select to restrict access to the .csv lie. In IAM Glue Data Catalog, use S3 Select as the source of the IAM Glue database.
Answers
C.
Define an IAM Glue Data Catalog resource policy in IAM Glue to grant cross-account S3 object access to the .csv file.
C.
Define an IAM Glue Data Catalog resource policy in IAM Glue to grant cross-account S3 object access to the .csv file.
Answers
D.
Grant IAM Glue access to Amazon S3 in a resource-based policy that specifies the organization as the principal.
D.
Grant IAM Glue access to Amazon S3 in a resource-based policy that specifies the organization as the principal.
Answers
Suggested answer: A

A company is attempting to conduct forensic analysis on an Amazon EC2 instance, but the company is unable to connect to the instance by using AWS Systems Manager Session Manager. The company has installed AWS Systems Manager Agent (SSM Agent) on the EC2 instance.

The EC2 instance is in a subnet in a VPC that does not have an internet gateway attached. The company has associated a security group with the EC2 instance. The security group does not have inbound or outbound rules. The subnet's network ACL allows all inbound and outbound traffic.

Which combination of actions will allow the company to conduct forensic analysis on the EC2 instance without compromising forensic data? (Select THREE.)

A.
Update the EC2 instance security group to add a rule that allows outbound traffic on port 443 for 0.0.0.0/0.
A.
Update the EC2 instance security group to add a rule that allows outbound traffic on port 443 for 0.0.0.0/0.
Answers
B.
Update the EC2 instance security group to add a rule that allows inbound traffic on port 443 to the VPC's CIDR range.
B.
Update the EC2 instance security group to add a rule that allows inbound traffic on port 443 to the VPC's CIDR range.
Answers
C.
Create an EC2 key pair. Associate the key pair with the EC2 instance.
C.
Create an EC2 key pair. Associate the key pair with the EC2 instance.
Answers
D.
Create a VPC interface endpoint for Systems Manager in the VPC where the EC2 instance is located.
D.
Create a VPC interface endpoint for Systems Manager in the VPC where the EC2 instance is located.
Answers
E.
Attach a security group to the VPC interface endpoint. Allow inbound traffic on port 443 to the VPC's CIDR range.
E.
Attach a security group to the VPC interface endpoint. Allow inbound traffic on port 443 to the VPC's CIDR range.
Answers
F.
Create a VPC interface endpoint for the EC2 instance in the VPC where the EC2 instance is located.
F.
Create a VPC interface endpoint for the EC2 instance in the VPC where the EC2 instance is located.
Answers
Suggested answer: B, C, F
Total 327 questions
Go to page: of 33