|Exam Name||:||AWS Certified Security - Specialty ( (SCS-C01)|
|Questions and Answers||:||120 Q & A|
|Updated On||:||Click to Check Update|
|PDF Download Mirror||:||AWS-CSS Brain Dump|
|Get Full Version||:||Pass4sure AWS-CSS Full Version|
A company has deployed a custom DNS server in AWS. The Security Engineer wants to ensure that Amazon EC2 instances cannot use the Amazon-provided DNS. How can the Security Engineer block access to the Amazon-provided DNS in the VPC?
Deny access to the Amazon DNS IP within all security groups.
Add a rule to all network access control lists that deny access to the Amazon DNS IP.
Add a route to all route tables that black holes traffic to the Amazon DNS IP.
Disable DNS resolution within the VPC configuration.
An employee accidentally exposed an AWS access key and secret access key during a public presentation. The company Security Engineer immediately disabled the key. How can the Engineer assess the impact of the key exposure and ensure that the credentials were not misused? (Choose two.)
Analyze AWS CloudTrail for activity.
Analyze Amazon CloudWatch Logs for activity.
Download and analyze the IAM Use report from AWS Trusted Advisor.
Analyze the resource inventory in AWS Config for IAM user activity.
Download and analyze a credential report from IAM.
Use security groups to provide stateful firewalls for Amazon EC2 instances at the hypervisor level.
Use network ACLs to provide stateful firewalls at the VPC level to prevent access to any specific AWS resource.
Use AWS Direct Connect for secure trusted connections between EC2 instances within private subnets.
Design network security in a single layer within the perimeter network (also known as DMZ, demilitarized zone, and screened subnet) to facilitate quicker responses to threats.
A distributed web application is installed across several EC2 instances in public subnets residing in two Availability Zones. Apache logs show several intermittent brute-force attacks from hundreds of IP addresses at the layer 7 level over the past six months.
What would be the BEST way to reduce the potential impact of these attacks in the future?
Use custom route tables to prevent malicious traffic from routing to the instances.
Update security groups to deny traffic from the originating source IP addresses.
Use network ACLs.
Install intrusion prevention software (IPS) on each instance.
A company plans to move most of its IT infrastructure to AWS. They want to leverage their existing on-premises Active Directory as an identity provider for AWS. Which combination of steps should a Security Engineer take to federate the company’s on-premises Active Directory with AWS? (Choose two.)
Create IAM roles with permissions corresponding to each Active Directory group.
Create IAM groups with permissions corresponding to each Active Directory group.
Configure Amazon Cloud Directory to support a SAML provider.
Configure Active Directory to add relying party trust between Active Directory and AWS.
Configure Amazon Cognito to add relying party trust between Active Directory and AWS.
A security alert has been raised for an Amazon EC2 instance in a customer account that is exhibiting strange behavior. The Security Engineer must first isolate the EC2 instance and then use tools for further investigation. What should the Security Engineer use to isolate and research this event? (Choose three.)
AWS Key Management Service (AWS KMS)
VPC Flow Logs
AWS Firewall Manager
A financial institution has the following security requirements:
Cloud-based users must be contained in a separate authentication domain. Cloud- based users cannot access on-premises systems.
As part of standing up a cloud environment, the financial institution is creating a number of Amazon managed databases and Amazon EC2 instances. An Active Directory service exists on-premises that has all the administrator accounts, and these must be able to access the databases and instances.
How would the organization manage its resources in the MOST secure manner? (Choose two.)
Configure an AWS Managed Microsoft AD to manage the cloud resources.
Configure an additional on-premises Active Directory service to manage the cloud resources.
Establish a one-way trust relationship from the existing Active Directory to the new Active Directory service.
Establish a one-way trust relationship from the new Active Directory to the existing Active Directory service.
Establish a two-way trust between the new and existing Active Directory services.
An organization wants to be alerted when an unauthorized Amazon EC2 instance in its VPC performs a network port scan against other instances in the VPC. When the Security team performs its own internal tests in a separate account by using pre-approved third-party scanners from the AWS Marketplace, the Security team also then receives multiple Amazon GuardDuty events from Amazon CloudWatch alerting on its test activities.
How can the Security team suppress alerts about authorized security tests while still receiving alerts about the unauthorized activity?
Use a filter in AWS CloudTrail to exclude the IP addresses of the Security team’s EC2 instances.
Add the Elastic IP addresses of the Security team’s EC2 instances to a trusted IP list in Amazon GuardDuty.
Install the Amazon Inspector agent on the EC2 instances that the Security team uses.
Grant the Security team’s EC2 instances a role with permissions to call Amazon GuardDuty API operations.