Amazon AWS Certified Security - Specialty SCS-C02 Exam Practice Questions (P. 3)
- Full Access (297 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
A company wants to receive an email notification about critical findings in AWS Security Hub. The company does not have an existing architecture that supports this functionality.
Which solution will meet the requirement?
Which solution will meet the requirement?
- ACreate an AWS Lambda function to identify critical Security Hub findings. Create an Amazon Simple Notification Service (Amazon SNS) topic as the target of the Lambda function. Subscribe an email endpoint to the SNS topic to receive published messages.
- BCreate an Amazon Kinesis Data Firehose delivery stream. Integrate the delivery stream with Amazon EventBridge. Create an EventBridge rule that has a filter to detect critical Security Hub findings. Configure the delivery stream to send the findings to an email address.
- CCreate an Amazon EventBridge rule to detect critical Security Hub findings. Create an Amazon Simple Notification Service (Amazon SNS) topic as the target of the EventBridge rule. Subscribe an email endpoint to the SNS topic to receive published messages.Most Voted
- DCreate an Amazon EventBridge rule to detect critical Security Hub findings. Create an Amazon Simple Email Service (Amazon SES) topic as the target of the EventBridge rule. Use the Amazon SES API to format the message. Choose an email address to be the recipient of the message.
Correct Answer:
D
D

Using Amazon EventBridge to detect critical Security Hub findings, coupled with Amazon Simple Notification Service (SNS) as a notification system, is a practical approach. Users can easily subscribe to the SNS topic via email to receive critical updates. However, there seems to be some confusion or a potential misunderstanding regarding the use of Amazon Simple Email Service (SES) as the target in the event solution. While direct integration of EventBridge with SES isn't standard, typically SNS serves as an intermediary for email notifications. Therefore, ensuring clarity on service compatibility and configuration in solution architecture is crucial.
send
light_mode
delete
Question #12
An international company has established a new business entity in South Korea. The company also has established a new AWS account to contain the workload for the South Korean region. The company has set up the workload in the new account in the ap-northeast-2 Region. The workload consists of three Auto Scaling groups of Amazon EC2 instances. All workloads that operate in this Region must keep system logs and application logs for 7 years.
A security engineer must implement a solution to ensure that no logging data is lost for each instance during scaling activities. The solution also must keep the logs for only the required period of 7 years.
Which combination of steps should the security engineer take to meet these requirements? (Choose three.)
A security engineer must implement a solution to ensure that no logging data is lost for each instance during scaling activities. The solution also must keep the logs for only the required period of 7 years.
Which combination of steps should the security engineer take to meet these requirements? (Choose three.)
- AEnsure that the Amazon CloudWatch agent is installed on all the EC2 instances that the Auto Scaling groups launch. Generate a CloudWatch agent configuration file to forward the required logs to Amazon CloudWatch Logs.Most Voted
- BSet the log retention for desired log groups to 7 years.Most Voted
- CAttach an IAM role to the launch configuration or launch template that the Auto Scaling groups use. Configure the role to provide the necessary permissions to forward logs to Amazon CloudWatch Logs.Most Voted
- DAttach an IAM role to the launch configuration or launch template that the Auto Scaling groups use. Configure the role to provide the necessary permissions to forward logs to Amazon S3.
- EEnsure that a log forwarding application is installed on all the EC2 instances that the Auto Scaling groups launch. Configure the log forwarding application to periodically bundle the logs and forward the logs to Amazon S3.
- FConfigure an Amazon S3 Lifecycle policy on the target S3 bucket to expire objects after 7 years.
Correct Answer:
ABC
ABC

To comply with the logging requirements stipulated for the Auto Scaling groups in the ap-northeast-2 Region, it's crucial to optimize the setup ensuring no data loss during scaling and compliance with the 7-year retention policy. Installing CloudWatch agent on the EC2 instances ensures logs are captured efficiently. Configuring the IAM role for permissions helps in seamless log forwarding to CloudWatch Logs. Setting the retention period to 7 years in CloudWatch Log groups accomplishes the compliance aspect effectively, ensuring logs are retained for the required duration. This approach provides a robust and compliant logging solution for the described scenario.
send
light_mode
delete
Question #13
A security engineer is designing an IAM policy to protect AWS API operations. The policy must enforce multi-factor authentication (MFA) for IAM users to access certain services in the AWS production account. Each session must remain valid for only 2 hours. The current version of the IAM policy is as follows:

Which combination of conditions must the security engineer add to the IAM policy to meet these requirements? (Choose two.)

Which combination of conditions must the security engineer add to the IAM policy to meet these requirements? (Choose two.)
- A"Bool": {"aws:MultiFactorAuthPresent": "true"}Most Voted
- B"Bool": {"aws:MultiFactorAuthPresent": "false"}
- C"NumericLessThan": {"aws:MultiFactorAuthAge": "7200"}Most Voted
- D"NumericGreaterThan": {"aws:MultiFactorAuthAge": "7200"}
- E"NumericLessThan": {"MaxSessionDuration": "7200"}
Correct Answer:
AD
AD
send
light_mode
delete
Question #14
A company uses AWS Organizations and has production workloads across multiple AWS accounts. A security engineer needs to design a solution that will proactively monitor for suspicious behavior across all the accounts that contain production workloads.
The solution must automate remediation of incidents across the production accounts. The solution also must publish a notification to an Amazon Simple Notification Service (Amazon SNS) topic when a critical security finding is detected. In addition, the solution must send all security incident logs to a dedicated account.
Which solution will meet these requirements?
The solution must automate remediation of incidents across the production accounts. The solution also must publish a notification to an Amazon Simple Notification Service (Amazon SNS) topic when a critical security finding is detected. In addition, the solution must send all security incident logs to a dedicated account.
Which solution will meet these requirements?
- AActivate Amazon GuardDuty in each production account. In a dedicated logging account, aggregate all GuardDuty logs from each production account. Remediate incidents by configuring GuardDuty to directly invoke an AWS Lambda function. Configure the Lambda function to also publish notifications to the SNS topic.
- BActivate AWS Security Hub in each production account. In a dedicated logging account, aggregate all Security Hub findings from each production account. Remediate incidents by using AWS Config and AWS Systems Manager. Configure Systems Manager to also publish notifications to the SNS topic.
- CActivate Amazon GuardDuty in each production account. In a dedicated logging account, aggregate all GuardDuty logs from each production account. Remediate incidents by using Amazon EventBridge to invoke a custom AWS Lambda function from the GuardDuty findings. Configure the Lambda function to also publish notifications to the SNS topic.Most Voted
- DActivate AWS Security Hub in each production account. In a dedicated logging account, aggregate all Security Hub findings from each production account. Remediate incidents by using Amazon EventBridge to invoke a custom AWS Lambda function from the Security Hub findings. Configure the Lambda function to also publish notifications to the SNS topic.
Correct Answer:
D
D

Option D is the correct answer when considering the requirement to monitor, automate remediation, and send notifications for suspicious behavior across multiple AWS accounts. While Amazon GuardDuty is vital for threat detection, AWS Security Hub provides a comprehensive view by aggregating security findings across services, which is essential for managing security posture and compliance effectively. Security Hub, combined with Amazon EventBridge and AWS Lambda, facilitates centralized incident management and automated response—factors critical for handling security incidents efficiently in a multi-account environment.
send
light_mode
delete
Question #15
A company is designing a multi-account structure for its development teams. The company is using AWS Organizations and AWS IAM Identity Center (AWS Single Sign-On). The company must implement a solution so that the development teams can use only specific AWS Regions and so that each AWS account allows access to only specific AWS services.
Which solution will meet these requirements with the LEAST operational overhead?
Which solution will meet these requirements with the LEAST operational overhead?
- AUse IAM Identity Center to set up service-linked roles with IAM policy statements that include the Condition, Resource, and NotAction elements to allow access to only the Regions and services that are needed.
- BDeactivate AWS Security Token Service (AWS STS) in Regions that the developers are not allowed to use.
- CCreate SCPs that include the Condition, Resource, and NotAction elements to allow access to only the Regions and services that are needed.Most Voted
- DFor each AWS account, create tailored identity-based policies for IAM Identity Center. Use statements that include the Condition, Resource, and NotAction elements to allow access to only the Regions and services that are needed.
Correct Answer:
C
C

Service Control Policies (SCPs) are the optimal approach to managing permissions across multiple AWS accounts with minimal effort. By applying SCPs, organizations can restrict accounts within their organization from accessing specific AWS services in certain regions. SCPs manage permissions at the organizational level, providing a centralized policy management system that reduces the complexity of individual account configurations. With SCPs, it's straightforward to enforce consistent access controls across all accounts, ensuring compliance and simplifying administration. Remember that the 'NotAction' element is indeed usable in SCPs, allowing for effective exceptions within your policies.
send
light_mode
delete
All Pages