Month End Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following SCS-C01 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is SCS-C02

SCS-C01 Exam Dumps - AWS Certified Security - Specialty

Go to page:
Question # 57

Your company has the following setup in IAM

a. A set of EC2 Instances hosting a web application

b. An application load balancer placed in front of the EC2 Instances

There seems to be a set of malicious requests coming from a set of IP addresses. Which of the following can be used to protect against these requests?

Please select:

A.

Use Security Groups to block the IP addresses

B.

Use VPC Flow Logs to block the IP addresses

C.

Use IAM inspector to block the IP addresses

D.

Use IAM WAF to block the IP addresses

Full Access
Question # 58

Your company has many IAM accounts defined and all are managed via IAM Organizations. One IAM account has a S3 bucket that has critical data. How can we ensure that all the users in the IAM organisation have access to this bucket?

Please select:

A.

Ensure the bucket policy has a condition which involves IAM:PrincipalOrglD

B.

Ensure the bucket policy has a condition which involves IAM:AccountNumber

C.

Ensure the bucket policy has a condition which involves IAM:PrincipaliD

D.

Ensure the bucket policy has a condition which involves IAM:OrglD

Full Access
Question # 59

You want to ensure that you keep a check on the Active EBS Volumes, Active snapshots and Elastic IP addresses you use so that you don't go beyond the service limit. Which of the below services can help in this regard?

Please select:

A.

IAM Cloudwatch

B.

IAM EC2

C.

IAM Trusted Advisor

D.

IAM SNS

Full Access
Question # 60

Your developer is using the KMS service and an assigned key in their Java program. They get the below error when

running the code

arn:IAM:iam::113745388712:user/UserB is not authorized to perform: kms:DescribeKey

Which of the following could help resolve the issue?

Please select:

A.

Ensure that UserB is given the right IAM role to access the key

B.

Ensure that UserB is given the right permissions in the IAM policy

C.

Ensure that UserB is given the right permissions in the Key policy

D.

Ensure that UserB is given the right permissions in the Bucket policy

Full Access
Question # 61

You need to have a requirement to store objects in an S3 bucket with a key that is automatically managed and rotated. Which of the following can be used for this purpose?

Please select:

A.

IAM KMS

B.

IAM S3 Server side encryption

C.

IAM Customer Keys

D.

IAM Cloud HSM

Full Access
Question # 62

An employee keeps terminating EC2 instances on the production environment. You've determined the best way to ensure this doesn't happen is to add an extra layer of defense against terminating the instances. What is the best method to ensure the employee does not terminate the production instances? Choose the 2 correct answers from the options below

Please select:

A.

Tag the instance with a production-identifying tag and add resource-level permissions to the employee user with an explicit deny on the terminate API call to instances with the production tag. <

B.

Tag the instance with a production-identifying tag and modify the employees group to allow only start stop, and reboot API calls and not the terminate instance call.

C.

Modify the IAM policy on the user to require MFA before deleting EC2 instances and disable MFA access to the employee

D.

Modify the IAM policy on the user to require MFA before deleting EC2 instances

Full Access
Question # 63

Your company has confidential documents stored in the simple storage service. Due to compliance requirements, you have to ensure that the data in the S3 bucket is available in a different geographical location. As an architect what is the change you would make to comply with this requirement.

Please select:

A.

Apply Multi-AZ for the underlying 53 bucket

B.

Copy the data to an EBS Volume in another Region

C.

Create a snapshot of the S3 bucket and copy it to another region

D.

Enable Cross region replication for the S3 bucket

Full Access
Question # 64

You are planning on using the IAM KMS service for managing keys for your application. For which of the following can the KMS CMK keys be used for encrypting? Choose 2 answers from the options given below

Please select:

A.

Image Objects

B.

Large files

C.

Password

D.

RSA Keys

Full Access
Go to page: