Amazon AWS Certified Security - Specialty SCS-C01
Prev

There are 254 results

Next
#171 (Accuracy: 100% / 4 votes)
An application uses Amazon Cognito to manage end users' permissions when directly accessing AWS resources, including Amazon DynamoDB. A new feature request reads as follows:
Provide a mechanism to mark customers as suspended pending investigation or suspended permanently.
Customers should still be able to log in when suspended, but should not be able to make changes.
The priorities are to reduce complexity and avoid potential for future security issues.

Which approach will meet these requirements and priorities?
  • A. Create a new database field ג€suspended_statusג€ and modify the application logic to validate that field when processing requests.
  • B. Add suspended customers to second Cognito user pool and update the application login flow to check both user pools.
  • C. Use Amazon Cognito Sync to push out a ג€suspension_statusג€ parameter and split the IAM policy into normal users and suspended users.
  • D. Move suspended customers to a second Cognito group and define an appropriate IAM access policy for the group.
#172 (Accuracy: 100% / 4 votes)
An Amazon EC2 instance is part of an EC2 Auto Scaling group that is behind an Application Load Balancer (ALB). It is suspected that the EC2 instance has been compromised.
Which steps should be taken to investigate the suspected compromise? (Choose three.)
  • A. Detach the elastic network interface from the EC2 instance.
  • B. Initiate an Amazon Elastic Block Store volume snapshot of all volumes on the EC2 instance.
  • C. Disable any Amazon Route 53 health checks associated with the EC2 instance.
  • D. De-register the EC2 instance from the ALB and detach it from the Auto Scaling group.
  • E. Attach a security group that has restrictive ingress and egress rules to the EC2 instance.
  • F. Add a rule to an AWS WAF to block access to the EC2 instance.
#173 (Accuracy: 100% / 6 votes)
Some highly sensitive analytics workloads are to be moved to Amazon EC2 hosts. Threat modeling has found that a risk exists where a subnet could be maliciously or accidentally exposed to the internet.
Which of the following mitigations should be recommended?
  • A. Use AWS Config to detect whether an Internet Gateway is added and use an AWS Lambda function to provide auto-remediation.
  • B. Within the Amazon VPC configuration, mark the VPC as private and disable Elastic IP addresses.
  • C. Use IPv6 addressing exclusively on the EC2 hosts, as this prevents the hosts from being accessed from the internet.
  • D. Move the workload to a Dedicated Host, as this provides additional network security controls and monitoring.
#174 (Accuracy: 100% / 4 votes)
A Systems Engineer is troubleshooting the connectivity of a test environment that includes a virtual security appliance deployed inline. In addition to using the virtual security appliance, the Development team wants to use security groups and network ACLs to accomplish various security requirements in the environment.
What configuration is necessary to allow the virtual security appliance to route the traffic?
  • A. Disable network ACLs.
  • B. Configure the security appliance's elastic network interface for promiscuous mode.
  • C. Disable the Network Source/Destination check on the security appliance's elastic network interface
  • D. Place the security appliance in the public subnet with the internet gateway
#175 (Accuracy: 92% / 8 votes)
A company runs an application on AWS that needs to be accessed only by employees. Most employees work from the office, but others work remotely or travel.
How can the Security Engineer protect this workload so that only employees can access it?
  • A. Add each employee's home IP address to the security group for the application so that only those users can access the workload.
  • B. Create a virtual gateway for VPN connectivity for each employee, and restrict access to the workload from within the VPC.
  • C. Use a VPN appliance from the AWS Marketplace for users to connect to, and restrict workload access to traffic from that appliance.
  • D. Route all traffic to the workload through AWS WAF. Add each employee's home IP address into an AWS WAF rule, and block all other traffic.
#176 (Accuracy: 100% / 5 votes)
The Security Engineer is managing a traditional three-tier web application that is running on Amazon EC2 instances. The application has become the target of increasing numbers of malicious attacks from the Internet.
What steps should the Security Engineer take to check for known vulnerabilities and limit the attack surface? (Choose two.)
  • A. Use AWS Certificate Manager to encrypt all traffic between the client and application servers.
  • B. Review the application security groups to ensure that only the necessary ports are open.
  • C. Use Elastic Load Balancing to offload Secure Sockets Layer encryption.
  • D. Use Amazon Inspector to periodically scan the backend instances.
  • E. Use AWS Key Management Services to encrypt all the traffic between the client and application servers.
#177 (Accuracy: 100% / 8 votes)
A Security Engineer discovers that developers have been adding rules to security groups that allow SSH and RDP traffic from 0.0.0.0/0 instead of the organization firewall IP.
What is the most efficient way to remediate the risk of this activity?
  • A. Delete the internet gateway associated with the VPC.
  • B. Use network access control lists to block source IP addresses matching 0.0.0.0/0.
  • C. Use a host-based firewall to prevent access from all but the organization's firewall IP.
  • D. Use AWS Config rules to detect 0.0.0.0/0 and invoke an AWS Lambda function to update the security group with the organization's firewall IP.
#178 (Accuracy: 100% / 3 votes)
Which of the following are valid event sources that are associated with web access control lists that trigger AWS WAF rules? (Choose two.)
  • A. Amazon S3 static web hosting
  • B. Amazon CloudFront distribution
  • C. Application Load Balancer
  • D. Amazon Route 53
  • E. VPC Flow Logs
#179 (Accuracy: 100% / 5 votes)
Amazon CloudWatch Logs agent is successfully delivering logs to the CloudWatch Logs service. However, logs stop being delivered after the associated log stream has been active for a specific number of hours.
What steps are necessary to identify the cause of this phenomenon? (Choose two.)
  • A. Ensure that file permissions for monitored files that allow the CloudWatch Logs agent to read the file have not been modified.
  • B. Verify that the OS Log rotation rules are compatible with the configuration requirements for agent streaming.
  • C. Configure an Amazon Kinesis producer to first put the logs into Amazon Kinesis Streams.
  • D. Create a CloudWatch Logs metric to isolate a value that changes at least once during the period before logging stops.
  • E. Use AWS CloudFormation to dynamically create and maintain the configuration file for the CloudWatch Logs agent.
#180 (Accuracy: 92% / 18 votes)
During a recent internal investigation, it was discovered that all API logging was disabled in a production account, and the root user had created new API keys that appear to have been used several times.
What could have been done to detect and automatically remediate the incident?
  • A. Using Amazon Inspector, review all of the API calls and configure the inspector agent to leverage SNS topics to notify security of the change to AWS CloudTrail, and revoke the new API keys for the root user.
  • B. Using AWS Config, create a config rule that detects when AWS CloudTrail is disabled, as well as any calls to the root user create-api-key. Then use a Lambda function to re-enable CloudTrail logs and deactivate the root API keys.
  • C. Using Amazon CloudWatch, create a CloudWatch event that detects AWS CloudTrail deactivation and a separate Amazon Trusted Advisor check to automatically detect the creation of root API keys. Then use a Lambda function to enable AWS CloudTrail and deactivate the root API keys.
  • D. Using Amazon CloudTrail, create a new CloudTrail event that detects the deactivation of CloudTrail logs, and a separate CloudTrail event that detects the creation of root API keys. Then use a Lambda function to enable CloudTrail and deactivate the root API keys.