New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

All SCS-C01 Test Inside Amazon Web Services Questions

Page: 25 / 44
Total 589 questions

AWS Certified Security - Specialty Questions and Answers

Question 97

You want to track access requests for a particular S3 bucket. How can you achieve this in the easiest possible way?

Please select:

Options:

A.

Enable server access logging for the bucket

B.

Enable Cloudwatch metrics for the bucket

C.

Enable Cloudwatch logs for the bucket

D.

Enable IAM Config for the S3 bucket

Question 98

You are building a system to distribute confidential training videos to employees. Using CloudFront, what method could be used to serve content that is stored in S3, but not publicly accessible from S3 directly?

Please select:

Options:

A.

Create an Origin Access Identity (OAI) for CloudFront and grant access to the objects in your S3 bucket to that OAl.

B.

Add the CloudFront account security group "amazon-cf/amazon-cf-sg" to the appropriate S3 bucket policy.

C.

Create an Identity and Access Management (IAM) User for CloudFront and grant access to the objects in your S3 bucket to that IAM User.

D.

Create a S3 bucket policy that lists the CloudFront distribution ID as the Principal and the target bucket as the Amazon Resource Name (ARN).

Question 99

You need to inspect the running processes on an EC2 Instance that may have a security issue. How can you achieve this in the easiest way possible. Also you need to ensure that the process does not interfere with the continuous running of the instance.

Please select:

Options:

A.

Use IAM Cloudtrail to record the processes running on the server to an S3 bucket.

B.

Use IAM Cloudwatch to record the processes running on the server

C.

Use the SSM Run command to send the list of running processes information to an S3 bucket.

D.

Use IAM Config to see the changed process information on the server

Question 100

You have a set of application , database and web servers hosted in IAM. The web servers are placed behind an ELB. There are separate security groups for the application, database and web servers. The network security groups have been defined accordingly. There is an issue with the communication between the application and database servers. In order to troubleshoot the issue between just the application and database server, what is the ideal set of MINIMAL steps you would take?

Please select:

Options:

A.

Check the Inbound security rules for the database security group Check the Outbound security rules for the application security group

B.

Check the Outbound security rules for the database security group I Check the inbound security rules for the application security group

C.

Check the both the Inbound and Outbound security rules for the database security group Check the inbound security rules for the application security group

D.

Check the Outbound security rules for the database security group

Check the both the Inbound and Outbound security rules for the application security group

Page: 25 / 44
Total 589 questions