New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Amazon Web Services AWS Certified Specialty SCS-C03 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

A company needs to detect unauthenticated access to its Amazon Elastic Kubernetes Service (Amazon EKS) clusters. The solution must require no additional configuration of the existing EKS deployment.

Which solution will meet these requirements with the LEAST operational effort?

Options:

A.

Install a third-party security add-on.


B.

Enable AWS Security Hub and monitor Kubernetes findings.


C.

Monitor CloudWatch Container Insights metrics for EKS.


D.

Enable Amazon GuardDuty and use EKS Audit Log Monitoring.


Expert Solution
Questions # 12:

A company runs a public web application on Amazon EKS behind Amazon CloudFront and an Application Load Balancer (ALB). A security engineer must send a notification to an existing Amazon SNS topic when the application receives 10,000 requests from the same end-user IP address within any 5-minute period.

Which solution will meet these requirements?

Options:

A.

Configure CloudFront standard logging and CloudWatch Logs metric filters.


B.

Configure VPC Flow Logs and CloudWatch Logs metric filters.


C.

Configure an AWS WAF web ACL with an ASN match rule and CloudWatch alarms.


D.

Configure an AWS WAF web ACL with a rate-based rule. Associate it with CloudFront. Create a CloudWatch alarm to notify SNS.


Expert Solution
Questions # 13:

A company uses an organization in AWS Organizations to manage multiple AWS accounts. The company wants to centrally give users the ability to access Amazon Q Developer.

Which solution will meet this requirement?

Options:

A.

Enable AWS IAM Identity Center and set up Amazon Q Developer as an AWS managed application.


B.

Enable Amazon Cognito and create a new identity pool for Amazon Q Developer.


C.

Enable Amazon Cognito and set up Amazon Q Developer as an AWS managed application.


D.

Enable AWS IAM Identity Center and create a new identity pool for Amazon Q Developer.


Expert Solution
Questions # 14:

A company has AWS accounts in an organization in AWS Organizations. An Amazon S3 bucket in one account is publicly accessible. A security engineer must remove public access and ensure the bucket cannot be made public again.

Which solution will meet these requirements?

Options:

A.

Enforce KMS encryption and deny s3:GetObject by SCP.


B.

Enable PublicAccessBlock and deny s3:GetObject by SCP.


C.

Enable PublicAccessBlock and deny s3:PutPublicAccessBlock by SCP.


D.

Enable Object Lock governance and deny s3:PutPublicAccessBlock by SCP.


Expert Solution
Questions # 15:

A security engineer configured VPC Flow Logs to publish to Amazon CloudWatch Logs. After 10 minutes, no logs appear. The issue is isolated to the IAM role associated with VPC Flow Logs.

What could be the reason?

Options:

A.

logs:GetLogEvents is missing.


B.

The engineer cannot assume the role.


C.

The vpc-flow-logs.amazonaws.com principal cannot assume the role.


D.

The role cannot tag the log stream.


Expert Solution
Questions # 16:

A company hosts its public website on Amazon EC2 instances behind an Application Load Balancer (ALB). The website is experiencing a global DDoS attack from a specific IoT device brand that uses a unique user agent. A security engineer is creating an AWS WAF web ACL and will associate it with the ALB.

Which rule statement will mitigate the current attack and future attacks from these IoT devices without blocking legitimate customers?

Options:

A.

Use an IP set match rule statement.


B.

Use a geographic match rule statement.


C.

Use a rate-based rule statement.


D.

Use a string match rule statement on the user agent.


Expert Solution
Questions # 17:

A company needs a cloud-based, managed desktop solution for its workforce of remote employees. The company wants to ensure that the employees can access the desktops only by using company-provided devices. A security engineer must design a solution that will minimize cost and management overhead.

Which solution will meet these requirements?

Options:

A.

Deploy a custom virtual desktop infrastructure (VDI) solution with a restriction policy to allow access only from corporate devices.


B.

Deploy a fleet of Amazon EC2 instances. Assign an instance to each employee with certificate-based device authentication that uses Windows Active Directory.


C.

Deploy Amazon WorkSpaces. Set up a trusted device policy with IP blocking on the authentication gateway by using AWS Identity and Access Management (IAM).


D.

Deploy Amazon WorkSpaces. Create client certificates, and deploy them to trusted devices. Enable restricted access at the directory level.


Expert Solution
Questions # 18:

A company has decided to move its fleet of Linux-based web server instances to an Amazon EC2 Auto Scaling group. Currently, the instances are static and are launched manually. When an administrator needs to view log files, the administrator uses SSH to establish a connection to the instances and retrieves the logs manually.

The company often needs to query the logs to produce results about application sessions and user issues. The company does not want its new automatically scaling architecture to result in the loss of any log files when instances are scaled in.

Which combination of steps should a security engineer take to meet these requirements MOST cost-effectively? (Select TWO.)

Options:

A.

Configure a cron job on the instances to forward the log files to Amazon S3 periodically.


B.

Configure AWS Glue and Amazon Athena to query the log files.


C.

Configure the Amazon CloudWatch agent on the instances to forward the logs to Amazon CloudWatch Logs.


D.

Configure Amazon CloudWatch Logs Insights to query the log files.


E.

Configure the instances to write the logs to an Amazon Elastic File System (Amazon EFS) volume.


Expert Solution
Questions # 19:

A company is running a new workload across accounts in an organization in AWS Organizations. All running resources must have a tag of CostCenter, and the tag must have one of three approved values. The company must enforce this policy and must prevent any changes of the CostCenter tag to a non-approved value.

Which solution will meet these requirements?

Options:

A.

Use AWS Config custom policy rule and an SCP to deny non-approved aws:RequestTag/CostCenter values.


B.

Use CloudTrail + EventBridge + Lambda to block creation.


C.

Enable tag policies, define allowed values, enforce noncompliant operations, and use an SCP to deny creation when aws:RequestTag/CostCenter is null.


D.

Enable tag policies and use EventBridge + Lambda to block changes.


Expert Solution
Questions # 20:

Notify when IAM roles are modified.

Options:

A.

Use Amazon Detective.


B.

Use EventBridge with CloudTrail events.


C.

Use CloudWatch metric filters.


D.

Use CloudWatch subscription filters.


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions