ExamGecko
Home Home / Amazon / SCS-C02

Amazon SCS-C02 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











A corporation is preparing to acquire several companies. A Security Engineer must design a solution to ensure that newly acquired IAM accounts follow the corporation's security best practices. The solution should monitor each Amazon S3 bucket for unrestricted public write access and use IAM managed services.

What should the Security Engineer do to meet these requirements?

A.
Configure Amazon Macie to continuously check the configuration of all S3 buckets.
A.
Configure Amazon Macie to continuously check the configuration of all S3 buckets.
Answers
B.
Enable IAM Config to check the configuration of each S3 bucket.
B.
Enable IAM Config to check the configuration of each S3 bucket.
Answers
C.
Set up IAM Systems Manager to monitor S3 bucket policies for public write access.
C.
Set up IAM Systems Manager to monitor S3 bucket policies for public write access.
Answers
D.
Configure an Amazon EC2 instance to have an IAM role and a cron job that checks the status of all S3 buckets.
D.
Configure an Amazon EC2 instance to have an IAM role and a cron job that checks the status of all S3 buckets.
Answers
Suggested answer: C

Explanation:

because this is a solution that can monitor each S3 bucket for unrestricted public write access and use IAM managed services. S3 is a service that provides object storage in the cloud. Systems Manager is a service that helps you automate and manage your AWS resources. You can use Systems Manager to monitor S3 bucket policies for public write access by using a State Manager association that runs a predefined document calledAWS-FindS3BucketWithPublicWriteAccess. This document checks each S3 bucket in an account and reports any bucket that has public write access enabled. The other options are either not suitable or not feasible for meeting the requirements.

A Security Engineer is troubleshooting an issue with a company's custom logging application. The application logs are written to an Amazon S3 bucket with event notifications enabled to send events lo an Amazon SNS topic. All logs are encrypted at rest using an IAM KMS CMK. The SNS topic is subscribed to an encrypted Amazon SQS queue. The logging application polls the queue for new messages that contain metadata about the S3 object. The application then reads the content of the object from the S3 bucket for indexing.

The Logging team reported that Amazon CloudWatch metrics for the number of messages sent or received is showing zero. No togs are being received.

What should the Security Engineer do to troubleshoot this issue?

A) Add the following statement to the IAM managed CMKs:

B)

Add the following statement to the CMK key policy:

C)

Add the following statement to the CMK key policy:

D)

Add the following statement to the CMK key policy:

A.
Option A
A.
Option A
Answers
B.
Option B
B.
Option B
Answers
C.
Option C
C.
Option C
Answers
D.
Option D
D.
Option D
Answers
Suggested answer: D

Developers in an organization have moved from a standard application deployment to containers. The Security Engineer is tasked with ensuring that the containers are secure. Which strategies will reduce the attack surface and enhance the security of the containers? (Select TWO.)

A.
Use the containers to automate security deployments.
A.
Use the containers to automate security deployments.
Answers
B.
Limit resource consumption (CPU, memory), networking connections, ports, and unnecessary container libraries.
B.
Limit resource consumption (CPU, memory), networking connections, ports, and unnecessary container libraries.
Answers
C.
Segregate containers by host, function, and data classification.
C.
Segregate containers by host, function, and data classification.
Answers
D.
Use Docker Notary framework to sign task definitions.
D.
Use Docker Notary framework to sign task definitions.
Answers
E.
Enable container breakout at the host kernel.
E.
Enable container breakout at the host kernel.
Answers
Suggested answer: A, C

Explanation:

these are the strategies that can reduce the attack surface and enhance the security of the containers. Containers are a method of packaging and running applications in isolated environments. Using containers to automate security deployments can help ensure that security patches and updates are applied consistently and quickly across the container fleet. Segregating containers by host, function, and data classification can help limit the impact of a compromise and enforce the principle of least privilege. The other options are either irrelevant or risky for securing containers.

An organization wants to log all IAM API calls made within all of its IAM accounts, and must have a central place to analyze these logs. What steps should be taken to meet these requirements in the MOST secure manner? (Select TWO)

A.
Turn on IAM CloudTrail in each IAM account
A.
Turn on IAM CloudTrail in each IAM account
Answers
B.
Turn on CloudTrail in only the account that will be storing the logs
B.
Turn on CloudTrail in only the account that will be storing the logs
Answers
C.
Update the bucket ACL of the bucket in the account that will be storing the logs so that other accounts can log to it
C.
Update the bucket ACL of the bucket in the account that will be storing the logs so that other accounts can log to it
Answers
D.
Create a service-based role for CloudTrail and associate it with CloudTrail in each account
D.
Create a service-based role for CloudTrail and associate it with CloudTrail in each account
Answers
E.
Update the bucket policy of the bucket in the account that will be storing the logs so that other accounts can log to it
E.
Update the bucket policy of the bucket in the account that will be storing the logs so that other accounts can log to it
Answers
Suggested answer: A, E

Explanation:

these are the steps that can meet the requirements in the most secure manner. CloudTrail is a service that records AWS API calls and delivers log files to an S3 bucket. Turning on CloudTrail in each IAM account can help capture all IAM API calls made within those accounts. Updating the bucket policy of the bucket in the account that will be storing the logs can help grant other accounts permission to write log files to that bucket. The other options are either unnecessary or insecure for logging and analyzing IAM API calls.

An IT department currently has a Java web application deployed on Apache Tomcat running on Amazon EC2 instances. All traffic to the EC2 instances is sent through an internet-facing Application Load Balancer (ALB) The Security team has noticed during the past two days thousands of unusual read requests coming from hundreds of IP addresses. This is causing the Tomcat server to run out of threads and reject new connections

Which the SIMPLEST change that would address this server issue?

A.
Create an Amazon CloudFront distribution and configure the ALB as the origin
A.
Create an Amazon CloudFront distribution and configure the ALB as the origin
Answers
B.
Block the malicious IPs with a network access list (NACL).
B.
Block the malicious IPs with a network access list (NACL).
Answers
C.
Create an IAM Web Application Firewall (WAF). and attach it to the ALB
C.
Create an IAM Web Application Firewall (WAF). and attach it to the ALB
Answers
D.
Map the application domain name to use Route 53
D.
Map the application domain name to use Route 53
Answers
Suggested answer: A

Explanation:

this is the simplest change that can address the server issue. CloudFront is a service that provides a global network of edge locations that cache and deliver web content. Creating a CloudFront distribution and configuring the ALB as the origin can help reduce the load on the Tomcat server by serving cached content to the end users. CloudFront can also provide protection against distributed denial-of-service (DDoS) attacks by filtering malicious traffic at the edge locations. The other options are either ineffective or complex for solving the server issue.

An organization has a multi-petabyte workload that it is moving to Amazon S3, but the CISO is concerned about cryptographic wear-out and the blast radius if a key is compromised. How can the CISO be assured that IAM KMS and Amazon S3 are addressing the concerns? (Select TWO )

A.
There is no API operation to retrieve an S3 object in its encrypted form.
A.
There is no API operation to retrieve an S3 object in its encrypted form.
Answers
B.
Encryption of S3 objects is performed within the secure boundary of the KMS service.
B.
Encryption of S3 objects is performed within the secure boundary of the KMS service.
Answers
C.
S3 uses KMS to generate a unique data key for each individual object.
C.
S3 uses KMS to generate a unique data key for each individual object.
Answers
D.
Using a single master key to encrypt all data includes having a single place to perform audits and usage validation.
D.
Using a single master key to encrypt all data includes having a single place to perform audits and usage validation.
Answers
E.
The KMS encryption envelope digitally signs the master key during encryption to prevent cryptographic wear-out
E.
The KMS encryption envelope digitally signs the master key during encryption to prevent cryptographic wear-out
Answers
Suggested answer: C, E

Explanation:

because these are the features that can address the CISO's concerns about cryptographic wear-out and blast radius. Cryptographic wear-out is a phenomenon that occurs when a key is used too frequently or for too long, which increases the risk of compromise or degradation. Blast radius is a measure of how much damage a compromised key can cause to the encrypted data. S3 uses KMS to generate a unique data key for each individual object, which reduces both cryptographic wear-out and blast radius. The KMS encryption envelope digitally signs the master key during encryption, which prevents cryptographic wear-out by ensuring that only authorized parties can use the master key. The other options are either incorrect or irrelevant for addressing the CISO's concerns.

A company wants to deploy a distributed web application on a fleet of EC2 instances. The fleet will be fronted by a Classic Load Balancer that will be configured to terminate the TLS connection The company wants to make sure that all past and current TLS traffic to the Classic Load Balancer stays secure even if the certificate private key is leaked.

To ensure the company meets these requirements, a Security Engineer can configure a Classic Load Balancer with:

A.
An HTTPS listener that uses a certificate that is managed by Amazon Certification Manager.
A.
An HTTPS listener that uses a certificate that is managed by Amazon Certification Manager.
Answers
B.
An HTTPS listener that uses a custom security policy that allows only perfect forward secrecy cipher suites
B.
An HTTPS listener that uses a custom security policy that allows only perfect forward secrecy cipher suites
Answers
C.
An HTTPS listener that uses the latest IAM predefined ELBSecuntyPolicy-TLS-1 -2-2017-01 security policy
C.
An HTTPS listener that uses the latest IAM predefined ELBSecuntyPolicy-TLS-1 -2-2017-01 security policy
Answers
D.
A TCP listener that uses a custom security policy that allows only perfect forward secrecy cipher suites.
D.
A TCP listener that uses a custom security policy that allows only perfect forward secrecy cipher suites.
Answers
Suggested answer: B

Explanation:

this is a way to configure a Classic Load Balancer with perfect forward secrecy cipher suites. Perfect forward secrecy is a property of encryption protocols that ensures that past and current TLS traffic stays secure even if the certificate private key is leaked. Cipher suites are sets of algorithms that determine how encryption is performed. A custom security policy is a set of cipher suites and protocols that you can select for your load balancer to support. An HTTPS listener is a process that checks for connection requests using encrypted SSL/TLS protocol. By using an HTTPS listener that uses a custom security policy that allows only perfect forward secrecy cipher suites, you can ensure that your Classic Load Balancer meets the requirements. The other options are either invalid or insufficient for configuring a Classic Load Balancer with perfect forward secrecy cipher suites.

A company has two IAM accounts within IAM Organizations. In Account-1. Amazon EC2 Auto Scaling is launched using a service-linked role. In Account-2. Amazon EBS volumes are encrypted with an IAM KMS key A Security Engineer needs to ensure that the service-linked role can launch instances with these encrypted volumes

Which combination of steps should the Security Engineer take in both accounts? (Select TWO.)

A.
Allow Account-1 to access the KMS key in Account-2 using a key policy
A.
Allow Account-1 to access the KMS key in Account-2 using a key policy
Answers
B.
Attach an IAM policy to the service-linked role in Account-1 that allows these actions CreateGrant. DescnbeKey, Encrypt, GenerateDataKey, Decrypt, and ReEncrypt
B.
Attach an IAM policy to the service-linked role in Account-1 that allows these actions CreateGrant. DescnbeKey, Encrypt, GenerateDataKey, Decrypt, and ReEncrypt
Answers
C.
Create a KMS grant for the service-linked role with these actions CreateGrant, DescnbeKey Encrypt GenerateDataKey Decrypt, and ReEncrypt
C.
Create a KMS grant for the service-linked role with these actions CreateGrant, DescnbeKey Encrypt GenerateDataKey Decrypt, and ReEncrypt
Answers
D.
Attach an IAM policy to the role attached to the EC2 instances with KMS actions and then allow Account-1 in the KMS key policy.
D.
Attach an IAM policy to the role attached to the EC2 instances with KMS actions and then allow Account-1 in the KMS key policy.
Answers
E.
Attach an IAM policy to the user who is launching EC2 instances and allow the user to access the KMS key policy of Account-2.
E.
Attach an IAM policy to the user who is launching EC2 instances and allow the user to access the KMS key policy of Account-2.
Answers
Suggested answer: C, D

Explanation:

because these are the steps that can ensure that the service-linked role can launch instances with encrypted volumes. A service-linked role is a type of IAM role that is linked to an AWS service and allows the service to perform actions on your behalf. A KMS grant is a mechanism that allows you to delegate permissions to use a customer master key (CMK) to a principal such as a service-linked role. A KMS grant specifies the actions that the principal can perform, such as encrypting and decrypting data. By creating a KMS grant for the service-linked role with the specified actions, you can allow the service-linked role to use the CMK in Account-2 to launch instances with encrypted volumes. By attaching an IAM policy to the role attached to the EC2 instances with KMS actions and then allowing Account-1 in the KMS key policy, you can also enable cross-account access to the CMK and allow the EC2 instances to use the encrypted volumes. The other options are either incorrect or unnecessary for meeting the requirement.

During a manual review of system logs from an Amazon Linux EC2 instance, a Security Engineer noticed that there are sudo commands that were never properly alerted or reported on the Amazon CloudWatch Logs agent

Why were there no alerts on the sudo commands?

A.
There is a security group blocking outbound port 80 traffic that is preventing the agent from sending the logs
A.
There is a security group blocking outbound port 80 traffic that is preventing the agent from sending the logs
Answers
B.
The IAM instance profile on the EC2 instance was not properly configured to allow the CloudWatch Logs agent to push the logs to CloudWatch
B.
The IAM instance profile on the EC2 instance was not properly configured to allow the CloudWatch Logs agent to push the logs to CloudWatch
Answers
C.
CloudWatch Logs status is set to ON versus SECURE, which prevents it from pulling in OS security event logs
C.
CloudWatch Logs status is set to ON versus SECURE, which prevents it from pulling in OS security event logs
Answers
D.
The VPC requires that all traffic go through a proxy, and the CloudWatch Logs agent does not support a proxy configuration.
D.
The VPC requires that all traffic go through a proxy, and the CloudWatch Logs agent does not support a proxy configuration.
Answers
Suggested answer: B

Explanation:

the reason why there were no alerts on the sudo commands. Sudo commands are commands that allow a user to execute commands as another user, usually the superuser or root. CloudWatch Logs agent is a software agent that can send log data from an EC2 instance to CloudWatch Logs, a service that monitors and stores log data. The CloudWatch Logs agent needs an IAM instance profile, which is a container for an IAM role that allows applications running on an EC2 instance to make API requests to AWS services. If the IAM instance profile on the EC2 instance was not properly configured to allow the CloudWatch Logs agent to push the logs to CloudWatch, then there would be no alerts on the sudo commands. The other options are either irrelevant or invalid for explaining why there were no alerts on the sudo commands.

A large corporation is creating a multi-account strategy and needs to determine how its employees should access the IAM infrastructure.

Which of the following solutions would provide the MOST scalable solution?

A.
Create dedicated IAM users within each IAM account that employees can assume through federation based upon group membership in their existing identity provider
A.
Create dedicated IAM users within each IAM account that employees can assume through federation based upon group membership in their existing identity provider
Answers
B.
Use a centralized account with IAM roles that employees can assume through federation with their existing identity provider Use cross-account roles to allow the federated users to assume their target role in the resource accounts.
B.
Use a centralized account with IAM roles that employees can assume through federation with their existing identity provider Use cross-account roles to allow the federated users to assume their target role in the resource accounts.
Answers
C.
Configure the IAM Security Token Service to use Kerberos tokens so that users can use their existing corporate user names and passwords to access IAM resources directly
C.
Configure the IAM Security Token Service to use Kerberos tokens so that users can use their existing corporate user names and passwords to access IAM resources directly
Answers
D.
Configure the IAM trust policies within each account's role to set up a trust back to the corporation's existing identity provider allowing users to assume the role based off their SAML token
D.
Configure the IAM trust policies within each account's role to set up a trust back to the corporation's existing identity provider allowing users to assume the role based off their SAML token
Answers
Suggested answer: B

Explanation:

the most scalable solution for accessing the IAM infrastructure in a multi-account strategy. A multi-account strategy is a way of organizing your AWS resources into multiple IAM accounts for security, billing, and management purposes. Federation is a process that allows users to access AWS resources using credentials from an external identity provider such as Active Directory or SAML. IAM roles are sets of permissions that grant access to AWS resources. Cross-account roles are IAM roles that allow users in one account to access resources in another account. By using a centralized account with IAM roles that employees can assume through federation with their existing identity provider, you can simplify and streamline the access management process. By using cross-account roles to allow the federated users to assume their target role in the resource accounts, you can enable granular and flexible access control across multiple accounts. The other options are either less scalable or less secure for accessing the IAM infrastructure in a multi-account strategy.

Total 327 questions
Go to page: of 33