Uploaded by christoperpitonyak

AWS Certified Security - Specialty SCS-C02 Dumps Questions

advertisement
Pass
Certspots
Success
AWS Certified
Security - Specialty
(SCS-C02) Dumps
https://www.certspots.com/exam/scs-c02/
AWS SCS-C02 Exam Dumps
1. A developer at a company uses an SSH key to access multiple Amazon EC2 instances.
The company discovers that the SSH key has been posted on a public GitHub repository.
A security engineer verifies that the key has not been used recently.
How should the security engineer prevent unauthorized access to the EC2 instances?
A. Delete the key pair from the EC2 console. Create a new key pair.
B. Use the ModifylnstanceAttribute API operation to change the key on any EC2 instance
that is using the key.
C. Restrict SSH access in the security group to only known corporate IP addresses.
D. Update the key pair in any AMI that is used to launch the EC2 instances. Restart the
EC2 instances.
Answer: C
AWS SCS-C02 Exam Dumps
2. Which of the following are valid configurations for using SSL certificates with
Amazon CloudFront? (Select THREE)
A. Default AWS Certificate Manager certificate
B. Custom SSL certificate stored in AWS KMS
C. Default CloudFront certificate
D. Custom SSL certificate stored in AWS Certificate Manager
E. Default SSL certificate stored in AWS Secrets Manager
F. Custom SSL certificate stored in AWS IAM
Answer: A B C
AWS SCS-C02 Exam Dumps
3. A security engineer is using AWS Organizations and wants to optimize SCPs.
The security engineer needs to ensure that the SCPs conform to best practices.
Which approach should the security engineer take to meet this requirement?
A. Use AWS IAM Access Analyzer to analyze the policies. View the findings from
policy validation checks.
B. Review AWS Trusted Advisor checks for all accounts in the organization.
C. Set up AWS Audit Manager. Run an assessment for all AWS Regions for all
accounts.
D. Ensure that Amazon Inspector agents are installed on all Amazon EC2 instances in all accounts.
Answer: A
AWS SCS-C02 Exam Dumps
4. A Security Engineer receives alerts that an Amazon EC2 instance on a public
subnet is under an SFTP brute force attack from a specific IP address, which is a
known malicious bot.
What should the Security Engineer do to block the malicious bot?
A. Add a deny rule to the public VPC security group to block the malicious IP
B. Add the malicious IP to IAM WAF backhsted IPs
C. Configure Linux iptables or Windows Firewall to block any traffic from the
malicious IP
D. Modify the hosted zone in Amazon Route 53 and create a DNS sinkhole for
the malicious IP
Answer: D
AWS SCS-C02 Exam Dumps
5. A security engineer is configuring a new website that is named example.com.
The security engineer wants to secure communications with the website by
requiring users to connect to example.com through HTTPS.
Which of the following is a valid option for storing SSL/TLS certificates?
A. Custom SSL certificate that is stored in AWS Key Management Service (AWS
KMS)
B. Default SSL certificate that is stored in Amazon CloudFront.
C. Custom SSL certificate that is stored in AWS Certificate Manager (ACM)
D. Default SSL certificate that is stored in Amazon S3
Answer: C
AWS SCS-C02 Exam Dumps
6. A company has a large fleet of Linux Amazon EC2 instances and Windows EC2
instances that run in private subnets. The company wants all remote administration to be
performed as securely as possible in the AWS Cloud.
Which solution will meet these requirements?
A. Do not use SSH-RSA private keys during the launch of new instances. Implement AWS
Systems Manager Session Manager.
B. Generate new SSH-RSA private keys for existing instances. Implement AWS Systems
Manager Session Manager.
C. Do not use SSH-RSA private keys during the launch of new instances. Configure EC2
Instance Connect.
D. Generate new SSH-RSA private keys for existing instances. Configure EC2 Instance
Connect.
Answer: A
AWS SCS-C02 Exam Dumps
7. You work at a company that makes use of IAM resources. One of the key
security policies is to ensure that all data i encrypted both at rest and in transit.
Which of the following is one of the right ways to implement this.
A. Use S3 SSE and use SSL for data in transit
B. SSL termination on the ELB
C. Enabling Proxy Protocol
D. Enabling sticky sessions on your load balancer
Answer: A
AWS SCS-C02 Exam Dumps
8. A company has multiple Amazon S3 buckets encrypted with customer-managed CMKs
Due to regulatory requirements the keys must be rotated every year. The company's
Security Engineer has enabled automatic key rotation for the CMKs; however the
company wants to verity that the rotation has occurred.
What should the Security Engineer do to accomplish this?
A. Filter IAM CloudTrail logs for KeyRotaton events
B. Monitor Amazon CloudWatcn Events for any IAM KMS CMK rotation events
C. Using the IAM CLI. run the IAM kms gel-key-relation-status operation with the --key-id
parameter to check the CMK rotation date
D. Use Amazon Athena to query IAM CloudTrail logs saved in an S3 bucket to filter
Generate New Key events
Answer: C
AWS SCS-C02 Exam Dumps
9. A company deployed Amazon GuardDuty In the us-east-1 Region. The
company wants all DNS logs that relate to the company's Amazon EC2
instances to be inspected.
What should a security engineer do to ensure that the EC2 instances are logged?
A. Use IPv6 addresses that are configured for hostnames.
B. Configure external DNS resolvers as internal resolvers that are visible only to
IAM.
C. Use IAM DNS resolvers for all EC2 instances.
D. Configure a third-party DNS resolver with logging for all EC2 instances.
Answer: C
AWS SCS-C02 Exam Dumps
10. A company uses Amazon API Gateway to present REST APIs to users. An API
developer wants to analyze API access patterns without the need to parse the log files.
Which combination of steps will meet these requirements with the LEAST effort? (Select
TWO.)
A. Configure access logging for the required API stage.
B. Configure an AWS CloudTrail trail destination for API Gateway events. Configure filters
on the userldentity, userAgent, and sourcelPAddress fields.
C. Configure an Amazon S3 destination for API Gateway logs. Run Amazon Athena
queries to analyze API access information.
D. Use Amazon CloudWatch Logs Insights to analyze API access information.
E. Select the Enable Detailed CloudWatch Metrics option on the required API stage.
Answer: C D
Download