Amazon AWS Certified Security - Specialty SCS-C01
Prev

There are 254 results

Next
#1 (Accuracy: 100% / 3 votes)
A company wants to deploy an application in a private VPC that will not be connected to the internet. The company's security team will not allow bastion hosts or methods using SSH to log in to Amazon EC2 instances. The application team plans to use AWS Systems Manager Session Manager to connect to and manage the EC2 instances.
Which combination of steps should the security team take? (Choose three.)
  • A. Make sure the Systems Manager Agent is installed and running on all EC2 instances inside the VPC.
  • B. Ensure the IAM role attached to the EC2 instances in the VPC allows access to Systems Manager.
  • C. Create an SCP that prevents the creation of SSH key pairs.
  • D. Launch a NAT gateway in the VPC. Update the routing policies to forward traffic to this NAT gateway.
  • E. Ensure proper VPC endpoints are in place for Systems Manager and Amazon EC2.
  • F. Ensure the VPC has a transit gateway attachment. Update the routing policies to forward traffic to this transit gateway.
#2 (Accuracy: 100% / 5 votes)
An application is currently secured using network access control lists and security groups. Web servers are located in public subnets behind an Application Load
Balancer (ALB); application servers are located in private subnets.

How can edge security be enhanced to safeguard the Amazon EC2 instances against attack? (Choose two.)
  • A. Configure the application's EC2 instances to use NAT gateways for all inbound traffic.
  • B. Move the web servers to private subnets without public IP addresses.
  • C. Configure AWS WAF to provide DDoS attack protection for the ALB.
  • D. Require all inbound network traffic to route through a bastion host in the private subnet.
  • E. Require all inbound and outbound network traffic to route through an AWS Direct Connect connection.
#3 (Accuracy: 100% / 3 votes)
A company wants to control access to its AWS resources by using identities and groups that are defined in its existing Microsoft Active Directory.
What must the company create in its AWS account to map permissions for AWS services to Active Directory user attributes?
  • A. AWS IAM groups
  • B. AWS IAM users
  • C. AWS IAM roles
  • D. AWS IAM access keys
#4 (Accuracy: 100% / 2 votes)
A company is using Amazon Elastic Container Service (Amazon ECS) to run its container-based application on AWS. The company needs to ensure that the container images contain no severe vulnerabilities. The company also must ensure that only specific IAM roles and specific AWS accounts can access the container images.

Which solution will meet these requirements with the LEAST management overhead?
  • A. Pull images from the public container registry. Publish the images to Amazon Elastic Container Registry (Amazon ECR) repositories with scan on push configured in a centralized AWS account. Use a CI/CD pipeline to deploy the images to different AWS accounts. Use identity-based policies to restrict access to which IAM principals can access the images.
  • B. Pull images from the public container registry. Publish the images to a private container registry that is hosted on Amazon EC2 instances in a centralized AWS account. Deploy host-based container scanning tools to EC2 instances that run Amazon ECS. Restrict access to the container images by using basic authentication over HTTPS.
  • C. Pull images from the public container registry. Publish the images to Amazon Elastic Container Registry (Amazon ECR) repositories with scan on push configured in a centralized AWS account. Use a CI/CD pipeline to deploy the images to different AWS accounts. Use repository policies and identity-based policies to restrict access to which IAM principals and accounts can access the images.
  • D. Pull images from the public container registry. Publish the images to AWS CodeArtifact repositories in a centralized AWS account. Use a CI/CD pipeline to deploy the images to different AWS accounts. Use repository policies and identity-based policies to restrict access to which IAM principals and accounts can access the images.
#5 (Accuracy: 95% / 6 votes)
A company plans to use AWS CodeDeploy to deploy code to multiple Amazon EC2 instances in a VPC at the same time. The company needs to allow the CodeDeploy service to communicate with the instances in the VPC without going through the public internet for CodeDeploy API operations.

What should a security engineer do to meet this requirement?
  • A. Use a NAT gateway in the VPC.
  • B. Use an interface VPC endpoint for CodeDeploy API operations.
  • C. Use a gateway VPC endpoint for CodeDeploy API operations.
  • D. Use a VPN connection to the VPC.
#6 (Accuracy: 100% / 4 votes)
An organization wants to deploy a three-tier web application whereby the application servers run on Amazon EC2 instances. These EC2 instances need access to credentials that they will use to authenticate their SQL connections to an Amazon RDS DB instance. Also, AWS Lambda functions must issue queries to the RDS database by using the same database credentials.
The credentials must be stored so that the EC2 instances and the Lambda functions can access them.
No other access is allowed. The access logs must record when the credentials were accessed and by whom.
What should the Security Engineer do to meet these requirements?
  • A. Store the database credentials in AWS Key Management Service (AWS KMS). Create an IAM role with access to AWS KMS by using the EC2 and Lambda service principals in the role's trust policy. Add the role to an EC2 instance profile. Attach the instance profile to the EC2 instances. Set up Lambda to use the new role for execution.
  • B. Store the database credentials in AWS KMS. Create an IAM role with access to KMS by using the EC2 and Lambda service principals in the role's trust policy. Add the role to an EC2 instance profile. Attach the instance profile to the EC2 instances and the Lambda function.
  • C. Store the database credentials in AWS Secrets Manager. Create an IAM role with access to Secrets Manager by using the EC2 and Lambda service principals in the role's trust policy. Add the role to an EC2 instance profile. Attach the instance profile to the EC2 instances and the Lambda function.
  • D. Store the database credentials in AWS Secrets Manager. Create an IAM role with access to Secrets Manager by using the EC2 and Lambda service principals in the role's trust policy. Add the role to an EC2 instance profile. Attach the instance profile to the EC2 instances. Set up Lambda to use the new role for execution.
#7 (Accuracy: 100% / 2 votes)
A company is running its workloads in a single AWS Region and uses AWS Organizations. A security engineer must implement a solution to prevent users from launching resources in other Regions.

Which solution will meet these requirements with the LEAST operational overhead?
  • A. Create an IAM policy that has an aws:RequestedRegion condition that allows actions only in the designated Region. Attach the policy to all users.
  • B. Create an IAM policy that has an aws:RequestedRegion condition that denies actions that are not in the designated Region. Attach the policy to the AWS account in AWS Organizations.
  • C. Create an IAM policy that has an aws:RequestedRegion condition that allows the desired actions. Attach the policy only to the users who are in the designated Region.
  • D. Create an SCP that has an aws:RequestedRegion condition that denies actions that are not in the designated Region. Attach the SCP to the AWS account in AWS Organizations.
#8 (Accuracy: 100% / 3 votes)
An application makes calls to AWS services using the AWS SDK. The application runs on Amazon EC2 instances with an associated IAM role. When the application attempts to access an object within an Amazon S3 bucket; the Administrator receives the following error message: HTTP 403: Access Denied.
Which combination of steps should the Administrator take to troubleshoot this issue? (Choose three.)
  • A. Confirm that the EC2 instance's security group authorizes S3 access.
  • B. Verify that the KMS key policy allows decrypt access for the KMS key for this IAM principle.
  • C. Check the S3 bucket policy for statements that deny access to objects.
  • D. Confirm that the EC2 instance is using the correct key pair.
  • E. Confirm that the IAM role associated with the EC2 instance has the proper privileges.
  • F. Confirm that the instance and the S3 bucket are in the same Region.
#9 (Accuracy: 100% / 3 votes)
A company stores data on an Amazon EBS volume attached to an Amazon EC2 instance. The data is asynchronously replicated to an Amazon S3 bucket. Both the EBS volume and the S3 bucket are encrypted with the same AWS KMS Customer Master Key (CMK). A former employee scheduled a deletion of that CMK before leaving the company.
The company's Developer Operations department learns about this only after the CMK has been deleted.

Which steps must be taken to address this situation?
  • A. Copy the data directly from the EBS encrypted volume before the volume is detached from the EC2 instance.
  • B. Recover the data from the EBS encrypted volume using an earlier version of the KMS backing key.
  • C. Make a request to AWS Support to recover the S3 encrypted data.
  • D. Make a request to AWS Support to restore the deleted CMK, and use it to recover the data.
#10 (Accuracy: 100% / 4 votes)
A water utility company uses a number of Amazon EC2 instances to manage updates to a fleet of 2,000 Internet of Things (IoT) field devices that monitor water quality. These devices each have unique access credentials.
An operational safety policy requires that access to specific credentials is independently auditable.

What is the MOST cost-effective way to manage the storage of credentials?
  • A. Use AWS Systems Manager to store the credentials as Secure Strings Parameters. Secure by using an AWS KMS key.
  • B. Use AWS Key Management System to store a master key, which is used to encrypt the credentials. The encrypted credentials are stored in an Amazon RDS instance.
  • C. Use AWS Secrets Manager to store the credentials.
  • D. Store the credentials in a JSON file on Amazon S3 with server-side encryption.