Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following SCS-C01 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is SCS-C02

SCS-C01 Exam Dumps - AWS Certified Security - Specialty

Go to page:
Question # 65

You need to inspect the running processes on an EC2 Instance that may have a security issue. How can you achieve this in the easiest way possible. Also you need to ensure that the process does not interfere with the continuous running of the instance.

Please select:

A.

Use IAM Cloudtrail to record the processes running on the server to an S3 bucket.

B.

Use IAM Cloudwatch to record the processes running on the server

C.

Use the SSM Run command to send the list of running processes information to an S3 bucket.

D.

Use IAM Config to see the changed process information on the server

Full Access
Question # 66

Development teams in your organization use S3 buckets to store the log files for various applications hosted ir development environments in IAM. The developers want to keep the logs for one month for troubleshooting purposes, and then purge the logs. What feature will enable this requirement?

Please select:

A.

Adding a bucket policy on the S3 bucket.

B.

Configuring lifecycle configuration rules on the S3 bucket.

C.

Creating an IAM policy for the S3 bucket.

D.

Enabling CORS on the S3 bucket.

Full Access
Question # 67

A company requires that data stored in IAM be encrypted at rest. Which of the following approaches achieve this requirement? Select 2 answers from the options given below.

Please select:

A.

When storing data in Amazon EBS, use only EBS-optimized Amazon EC2 instances.

B.

When storing data in EBS, encrypt the volume by using IAM KMS.

C.

When storing data in Amazon S3, use object versioning and MFA Delete.

D.

When storing data in Amazon EC2 Instance Store, encrypt the volume by using KMS.

E.

When storing data in S3, enable server-side encryption.

Full Access
Question # 68

You have an Amazon VPC that has a private subnet and a public subnet in which you have a NAT instance server. You

have created a group of EC2 instances that configure themselves at startup by downloading a bootstrapping script

from S3 that deploys an application via GIT.

Which one of the following setups would give us the highest level of security?

Choose the correct answer from the options given below.

Please select:

A.

EC2 instances in our public subnet, no EIPs, route outgoing traffic via the IGW

B.

EC2 instances in our public subnet, assigned EIPs, and route outgoing traffic via the NAT

C.

EC2 instance in our private subnet, assigned EIPs, and route our outgoing traffic via our IGW

D.

EC2 instances in our private subnet, no EIPs, route outgoing traffic via the NAT

Full Access
Question # 69

You are planning on hosting a web application on IAM. You create an EC2 Instance in a public subnet. This instance needs to connect to an EC2 Instance that will host an Oracle database. Which of the following steps should be followed to ensure a secure setup is in place? Select 2 answers.

Please select:

A.

Place the EC2 Instance with the Oracle database in the same public subnet as the Web server for faster communication

B.

Place the EC2 Instance with the Oracle database in a separate private subnet

C.

Create a database security group and ensure the web security group to allowed incoming access

D.

Ensure the database security group allows incoming traffic from 0.0.0.0/0

Full Access
Question # 70

You currently operate a web application In the IAM US-East region. The application runs on an auto-scaled layer of EC2 instances and an RDS Multi-AZ database. Your IT security compliance officer has tasked you to develop a reliable and durable logging solution to track changes made to your EC2.IAM and RDS resources. The solution must ensure the integrity and confidentiality of your log data. Which of these solutions would you recommend?

Please select:

A.

Create a new CloudTrail trail with one new S3 bucket to store the logs and with the global services option selected. Use IAM roles S3 bucket policies and Mufti Factor Authentication (MFA) Delete on the S3 bucket that stores your logs.

B.

Create a new CloudTrail with one new S3 bucket to store the logs. Configure SNS to send log file delivery notifications to your management system. Use IAM roles and S3 bucket policies on the S3 bucket that stores your logs.

C.

Create a new CloudTrail trail with an existing S3 bucket to store the logs and with the global services option selected. Use S3 ACLsand Multi Factor Authentication (MFA) Delete on the S3 bucket that stores your logs.

D.

Create three new CloudTrail trails with three new S3 buckets to store the logs one for the IAM Management console, one for IAM SDKs and one for command line tools. Use IAM roles and S3 bucket policies on the S3 buckets that store your logs.

Full Access
Question # 71

You are working in the media industry and you have created a web application where users will be able to upload photos they create to your website. This web application must be able to call the S3 API in order to be able to function. Where should you store your API credentials whilst maintaining the maximum level of security?

Please select:

A.

Save the API credentials to your PHP files.

B.

Don't save your API credentials, instead create a role in IAM and assign this role to an EC2 instance when you first create it.

C.

Save your API credentials in a public Github repository.

D.

Pass API credentials to the instance using instance userdata.

Full Access
Question # 72

A company hosts data in S3. There is now a mandate that going forward all data in the S3 bucket needs to encrypt at rest. How can this be achieved?

Please select:

A.

Use IAM Access keys to encrypt the data

B.

Use SSL certificates to encrypt the data

C.

Enable server side encryption on the S3 bucket

D.

Enable MFA on the S3 bucket

Full Access
Go to page: