New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

New Release SCS-C01 AWS Certified Specialty Questions

Page: 24 / 44
Total 589 questions

AWS Certified Security - Specialty Questions and Answers

Question 93

One of your company's EC2 Instances have been compromised. The company has strict po thorough investigation on finding the culprit for the security breach. What would you do in from the options given below.

Please select:

Options:

A.

Take a snapshot of the EBS volume

B.

Isolate the machine from the network

C.

Make sure that logs are stored securely for auditing and troubleshooting purpose

D.

Ensure all passwords for all IAM users are changed

E.

Ensure that all access kevs are rotated.

Question 94

A security engineer must ensure that all infrastructure launched in the company IAM account be monitored for deviation from compliance rules, specifically that all EC2 instances are launched from one of a specified list of AM Is and that all attached EBS volumes are encrypted. Infrastructure not in compliance should be terminated. What combination of steps should the Engineer implement? Select 2 answers from the options given below.

Please select:

Options:

A.

Set up a CloudWatch event based on Trusted Advisor metrics

B.

Trigger a Lambda function from a scheduled CloudWatch event that terminates non-compliant infrastructure.

C.

Set up a CloudWatch event based on Amazon inspector findings

D.

Monitor compliance with IAM Config Rules triggered by configuration changes

E.

Trigger a CLI command from a CloudWatch event that terminates the infrastructure

Question 95

Your company has the following setup in IAM

a. A set of EC2 Instances hosting a web application

b. An application load balancer placed in front of the EC2 Instances

There seems to be a set of malicious requests coming from a set of IP addresses. Which of the following can be used to protect against these requests?

Please select:

Options:

A.

Use Security Groups to block the IP addresses

B.

Use VPC Flow Logs to block the IP addresses

C.

Use IAM inspector to block the IP addresses

D.

Use IAM WAF to block the IP addresses

Question 96

You are designing a connectivity solution between on-premises infrastructure and Amazon VPC. Your server's on-premises will be communicating with your VPC instances. You will be establishing IPSec tunnels over the internet. Yo will be using VPN gateways and terminating the IPsec tunnels on IAM-supported customer gateways. Which of the following objectives would you achieve by implementing an IPSec tunnel as outlined above? Choose 4 answers form the options below

Please select:

Options:

A.

End-to-end protection of data in transit

B.

End-to-end Identity authentication

C.

Data encryption across the internet

D.

Protection of data in transit over the Internet

E.

Peer identity authentication between VPN gateway and customer gateway

F.

Data integrity protection across the Internet

Page: 24 / 44
Total 589 questions