New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Amazon Web Services AWS Certified Specialty SCS-C03 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

A company creates AWS Lambda functions from container images that are stored in Amazon Elastic Container Registry (Amazon ECR). The company needs to identify any software vulnerabilities in the container images and any code vulnerabilities in the Lambda functions.

Which solution will meet these requirements?

Options:

A.

Enable Amazon GuardDuty. Configure Amazon ECR scanning and Lambda code scanning in GuardDuty.


B.

Enable Amazon GuardDuty. Configure Runtime Monitoring and Lambda Protection in GuardDuty.


C.

Enable Amazon Inspector. Configure Amazon ECR enhanced scanning and Lambda code scanning in Amazon Inspector.


D.

Enable AWS Security Hub. Configure Runtime Monitoring and Lambda Protection in Security Hub.


Expert Solution
Questions # 2:

A company uploads data files as objects into an Amazon S3 bucket. A vendor downloads the objects to perform data processing.

A security engineer must implement a solution that prevents objects from residing in the S3 bucket for longer than 72 hours.

Options:

A.

Configure S3 Versioning to expire object versions that have been in the bucket for 72 hours.


B.

Configure an S3 Lifecycle configuration rule on the bucket to expire objects after 72 hours.


C.

Use the S3 Intelligent-Tiering storage class and configure expiration after 72 hours.


D.

Generate presigned URLs that expire after 72 hours.


Expert Solution
Questions # 3:

A company needs to deploy AWS CloudFormation templates that configure sensitive database credentials. The company already uses AWS Key Management Service (AWS KMS) and AWS Secrets Manager.

Which solution will meet the requirements?

Options:

A.

Use a dynamic reference in the CloudFormation template to reference the database credentials in Secrets Manager.


B.

Use encrypted parameters in the CloudFormation template.


C.

Use SecureString parameters to reference Secrets Manager.


D.

Use SecureString parameters encrypted by AWS KMS.


Expert Solution
Questions # 4:

An AWS Lambda function was misused to alter data, and a security engineer must identify who invoked the function and what output was produced. The engineer cannot find any logs created by the Lambda function in Amazon CloudWatch Logs.

Which of the following explains why the logs are not available?

Options:

A.

The execution role for the Lambda function did not grant permissions to write log data to CloudWatch Logs.


B.

The Lambda function was invoked by using Amazon API Gateway, so the logs are not stored in CloudWatch Logs.


C.

The execution role for the Lambda function did not grant permissions to write to the Amazon S3 bucket where CloudWatch Logs stores the logs.


D.

The version of the Lambda function that was invoked was not current.


Expert Solution
Questions # 5:

A company recently experienced a malicious attack on its cloud-based environment. The company successfully contained and eradicated the attack. A security engineer is performing incident response work. The security engineer needs to recover an Amazon RDS database cluster to the last known good version. The database cluster is configured to generate automated backups with a retention period of 14 days. The initial attack occurred 5 days ago at exactly 3:15 PM.

Which solution will meet this requirement?

Options:

A.

Identify the Regional cluster ARN for the database. Use the ARN to restore the Regional cluster by using the restore to point in time feature. Set a target time 5 days ago at 3:14 PM.


B.

Identify the Regional cluster ARN for the database. List snapshots that have been taken of the cluster. Restore the database by using the snapshot that has a creation time that is closest to 5 days ago at 3:14 PM.


C.

List all snapshots that have been taken of all the company's RDS databases. Identify the snapshot that was taken closest to 5 days ago at 3:14 PM and restore it.


D.

Identify the Regional cluster ARN for the database. Use the ARN to restore the Regional cluster by using the restore to point in time feature. Set a target time 14 days ago.


Expert Solution
Questions # 6:

A company is running an application in the eu-west-1 Region. The application uses an AWS Key Management Service (AWS KMS) customer managed key to encrypt sensitive data. The company plans to deploy the application in the eu-north-1 Region. A security engineer needs to implement a key management solution for the application deployment in the new Region. The security engineer must minimize changes to the application code.

Which change should the security engineer make to the AWS KMS configuration to meet these requirements?

Options:

A.

Update the key policies in eu-west-1. Point the application in eu-north-1 to use the same customer managed key as the application in eu-west-1.


B.

Allocate a new customer managed key to eu-north-1 to be used by the application that is deployed in that Region.


C.

Allocate a new customer managed key to eu-north-1. Create the same alias name for both keys. Configure the application deployment to use the key alias.


D.

Allocate a new customer managed key to eu-north-1. Create an alias for eu--1. Change the application code to point to the alias for eu--1.


Expert Solution
Questions # 7:

A company has a VPC that has no internet access and has the private DNS hostnames option enabled. An Amazon Aurora database is running inside the VPC. A security engineer wants to use AWS Secrets Manager to automatically rotate the credentials for the Aurora database. The security engineer configures the Secrets Manager default AWS Lambda rotation function to run inside the same VPC that the Aurora database uses. However, the security engineer determines that the password cannot be rotated properly because the Lambda function cannot communicate with the Secrets Manager endpoint.

What is the MOST secure way that the security engineer can give the Lambda function the ability to communicate with the Secrets Manager endpoint?

Options:

A.

Add a NAT gateway to the VPC to allow access to the Secrets Manager endpoint.


B.

Add a gateway VPC endpoint to the VPC to allow access to the Secrets Manager endpoint.


C.

Add an interface VPC endpoint to the VPC to allow access to the Secrets Manager endpoint.


D.

Add an internet gateway for the VPC to allow access to the Secrets Manager endpoint.


Expert Solution
Questions # 8:

A security engineer discovers that a company's user passwords have no required minimum length. The company uses the following identity providers (IdPs):

• AWS Identity and Access Management (IAM) federated with on-premises Active Directory

• Amazon Cognito user pools that contain the user database for an AWS Cloud application

Which combination of actions should the security engineer take to implement a required minimum password length? (Select TWO.)

Options:

A.

Update the password length policy in the IAM configuration.


B.

Update the password length policy in the Amazon Cognito configuration.


C.

Update the password length policy in the on-premises Active Directory configuration.


D.

Create an SCP in AWS Organizations to enforce minimum password length.


E.

Create an IAM policy with a minimum password length condition.


Expert Solution
Questions # 9:

A company stores sensitive data in an Amazon S3 bucket. The company encrypts the data at rest by using server-side encryption with Amazon S3 managed keys (SSE-S3). A security engineer must prevent any modifications to the data in the S3 bucket.

Which solution will meet this requirement?

Options:

A.

Configure S3 bucket policies to deny DELETE and PUT object permissions.


B.

Configure S3 Object Lock in compliance mode with S3 bucket versioning enabled.


C.

Change the encryption on the S3 bucket to use AWS Key Management Service (AWS KMS) customer managed keys.


D.

Configure the S3 bucket with multi-factor authentication (MFA) delete protection.


Expert Solution
Questions # 10:

A company has a web application that reads from and writes to an Amazon S3 bucket. The company needs to authenticate all S3 API calls with AWS credentials.

Which solution will provide the application with AWS credentials?

Options:

A.

Use Amazon Cognito identity pools and the GetId API.


B.

Use Amazon Cognito identity pools and AssumeRoleWithWebIdentity.


C.

Use Amazon Cognito user pools with ID tokens.


D.

Use Amazon Cognito user pools with access tokens.


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions