Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Amazon Web Services AWS Certified Specialty SCS-C03 Questions and answers with CertsForce

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions
Questions # 31:

A security engineer needs to prepare Amazon EC2 instances for quarantine during a security incident. AWS Systems Manager Agent (SSM Agent) is installed, and a script exists to install and update forensic tools.

Which solution will quarantine EC2 instances during a security incident?

Options:

A.

Track SSM Agent versions with AWS Config.


B.

Configure Session Manager to deny external connections.


C.

Store the script in Amazon S3 and grant read access.


D.

Configure IAM permissions for the SSM Agent to run the script as a Systems Manager Run Command document.


Expert Solution
Questions # 32:

A company uses an organization in AWS Organizations to manage its 250 member accounts. The company also uses AWS IAM Identity Center with a SAML external identity provider (IdP). IAM Identity Center has been delegated to a member account. The company's security team has access to the delegated account.

The security team has been investigating a malicious internal user who might be accessing sensitive accounts. The security team needs to know when the user logged into the organization during the last 7 days.

Which solution will quickly identify the access attempts?

Options:

A.

In the delegated account, use Amazon CloudWatch Logs to search for events that match the user details for all successful attempts.


B.

In each member account, use the IAM Identity Center console to search for events that match the user details for all attempts.


C.

In the external IdP, use Amazon EventBridge to search for events that match the user details for all attempts.


D.

In the organization's management account, use AWS CloudTrail to search for events that match the user details for all successful attempts.


Expert Solution
Questions # 33:

A company has an encrypted Amazon Aurora DB cluster in the us-east-1 Region that uses an AWS KMS customer managed key. The company must copy a DB snapshot to the us-west-1 Region but cannot access the encryption key across Regions.

What should the company do to properly encrypt the snapshot in us-west-1?

Options:

A.

Store the customer managed key in AWS Secrets Manager in us-west-1.


B.

Create a new customer managed key in us-west-1 and use it to encrypt the snapshot.


C.

Create an IAM policy to allow access to the key in us-east-1 from us-west-1.


D.

Create an IAM policy that allows RDS in us-west-1 to access the key in us-east-1.


Expert Solution
Questions # 34:

A company hosts its public website on Amazon EC2 instances behind an Application Load Balancer (ALB). The website is experiencing a global DDoS attack from a specific IoT device brand that uses a unique user agent. A security engineer is creating an AWS WAF web ACL and will associate it with the ALB.

Which rule statement will mitigate the current attack and future attacks from these IoT devices without blocking legitimate customers?

Options:

A.

Use an IP set match rule statement.


B.

Use a geographic match rule statement.


C.

Use a rate-based rule statement.


D.

Use a string match rule statement on the user agent.


Expert Solution
Questions # 35:

A company uploads data files as objects into an Amazon S3 bucket. A vendor downloads the objects to perform data processing.

A security engineer must implement a solution that prevents objects from residing in the S3 bucket for longer than 72 hours.

Options:

A.

Configure S3 Versioning to expire object versions that have been in the bucket for 72 hours.


B.

Configure an S3 Lifecycle configuration rule on the bucket to expire objects after 72 hours.


C.

Use the S3 Intelligent-Tiering storage class and configure expiration after 72 hours.


D.

Generate presigned URLs that expire after 72 hours.


Expert Solution
Questions # 36:

A company’s data scientists use Amazon SageMaker with datasets stored in Amazon S3. Data older than 45 days must be removed according to policy.

Which action should enforce this policy?

Options:

A.

Configure an S3 Lifecycle rule to delete objects after 45 days.


B.

Create a Lambda function triggered on object upload to delete old data.


C.

Create a scheduled Lambda function to delete old objects monthly.


D.

Configure S3 Intelligent-Tiering.


Expert Solution
Questions # 37:

A company is using AWS CloudTrail and Amazon CloudWatch to monitor resources in an AWS account. The company’s developers have been using an IAM role in the account for the last 3 months.

A security engineer needs to refine the customer managed IAM policy attached to the role to ensure that the role provides least privilege access.

Which solution will meet this requirement with the LEAST effort?

Options:

A.

Implement AWS IAM Access Analyzer policy generation on the role.


B.

Implement AWS IAM Access Analyzer policy validation on the role.


C.

Search CloudWatch logs to determine the actions the role invoked and to evaluate the permissions.


D.

Use AWS Trusted Advisor to compare the policies assigned to the role against AWS best practices.


Expert Solution
Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions