New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

SCS-C01 Leak Questions

Page: 26 / 44
Total 589 questions

AWS Certified Security - Specialty Questions and Answers

Question 101

A user has enabled versioning on an S3 bucket. The user is using server side encryption for data at Rest. If the user is supplying his own keys for encryption SSE-C, which of the below mentioned statements is true?

Please select:

Options:

A.

The user should use the same encryption key for all versions of the same object

B.

It is possible to have different encryption keys for different versions of the same object

C.

IAM S3 does not allow the user to upload his own keys for server side encryption

D.

The SSE-C does not work when versioning is enabled

Question 102

A company has a legacy application that outputs all logs to a local text file. Logs from all applications running on IAM

must be continually monitored for security related messages.

What can be done to allow the company to deploy the legacy application on Amazon EC2 and still meet the monitoring

requirement?

Please select:

Options:

A.

Create a Lambda function that mounts the EBS volume with the logs and scans the logs for security incidents. Trigger the function every 5 minutes with a scheduled Cloudwatch event.

B.

Send the local text log files to CloudWatch Logs and configure a CloudWatch metric filter. Trigger cloudwatch alarms based on the metrics.

C.

Install the Amazon inspector agent on any EC2 instance running the legacy application. Generate CloudWatch alerts a based on any Amazon inspector findings.

D.

Export the local text log files to CloudTrail. Create a Lambda function that queries the CloudTrail logs for security ' incidents using Athena.

Question 103

Your company currently has a set of EC2 Instances hosted in a VPC. The IT Security department is suspecting a possible DDos attack on the instances. What can you do to zero in on the IP addresses which are receiving a flurry of requests.

Please select:

Options:

A.

Use VPC Flow logs to get the IP addresses accessing the EC2 Instances

B.

Use IAM Cloud trail to get the IP addresses accessing the EC2 Instances

C.

Use IAM Config to get the IP addresses accessing the EC2 Instances

D.

Use IAM Trusted Advisor to get the IP addresses accessing the EC2 Instances

Question 104

A company hosts critical data in an S3 bucket. Even though they have assigned the appropriate permissions to the bucket, they are still worried about data deletion. What measures can be taken to restrict the risk of data deletion on the bucket. Choose 2 answers from the options given below

Please select:

Options:

A.

Enable versioning on the S3 bucket

B.

Enable data at rest for the objects in the bucket

C.

Enable MFA Delete in the bucket policy

D.

Enable data in transit for the objects in the bucket

Page: 26 / 44
Total 589 questions