Skip to content
Tip 2 Cloud

Learn & move to cloud

SCS-C01 (Page 11)

How can the security engineer implement this solution?

2025-01-11
By: study aws cloud
On: January 11, 2025
In: SCS-C01
With: 0 Comments

A company is implementing a new application in a new AWS account.A VPC and subnets have been created for the application.The application has been peered to an existing VPC in another account in the same AWS Region for database access.Amazon EC2 instances will regularly be created and terminated in the application VPC, but only some of them will need access to the databases in the peered VPC over TCP port 1521.A security engineer must ensure that only theEC2 instances than need access to the databases can access them through the network.How can the security engineer implement this solution?Read More →

What should the security engineer do to resolve this issue?

2025-01-11
By: study aws cloud
On: January 11, 2025
In: SCS-C01
With: 0 Comments

A company is using AWS Organizations to manage multiple AWS member accounts.All of these accounts have Amazon GuardDuty enabled in all Regions.The company’s AWS Security Operations Center has a centralized security account for logging and monitoring.One of the member accounts has received an excessively high bill.A security engineer discovers that a compromised Amazon EC2 instance is being used to mine cryptocurrency.The Security OperationsCenter did not receive a GuardDuty finding in the central security account, but there was a GuardDuty finding in the account containing the compromised EC2 instance.The security engineer needs to ensure all GuardDuty findings are available in the security account.What should the security engineer do to resolve this issue?Read More →

Which of the following approaches grants the finance staff the permissions they require without granting any unnecessary permissions?

2025-01-11
By: study aws cloud
On: January 11, 2025
In: SCS-C01
With: 0 Comments

A company uses AWS Organization to manage 50 AWS accounts.The finance staff members log in as AWS IAM users in the FinanceDept AWS account.The staff members need to read the consolidated billing information in the MasterPayer AWS account.They should not be able to view any other resources in theMasterPayer AWS account.IAM access to billing has been enabled in the MasterPayer account.Which of the following approaches grants the finance staff the permissions they require without granting any unnecessary permissions?Read More →

Which combination of steps must the security engineer take to meet these requirements?

2025-01-11
By: study aws cloud
On: January 11, 2025
In: SCS-C01
With: 0 Comments

A security engineer receives an AWS abuse email message.According to the message, an Amazon EC2 instance that is running in the security engineer’s AWS account is sending phishing email messages.The EC2 instance is part of an application that is deployed in production.The application runs on many EC2 instances behind an Application Load Balancer.The instances run in an Amazon EC2 Auto Scaling group across multiple subnets and multiple Availability Zones.The instances normally communicate only over the HTTP, HTTPS, and MySQL protocols.Upon investigation, the security engineer discovers that email messages are being sent over port 587.All other traffic is normal.The security engineer must create a solution that contains the compromised EC2 instance, preserves forensic evidence for analysis, and minimizes application downtime.Which combination of steps must the security engineer take to meet these requirements? (Choose three.)Read More →

Which solution meets these requirements with the MOST operational efficiency?

2025-01-11
By: study aws cloud
On: January 11, 2025
In: SCS-C01
With: 0 Comments

An audit determined that a company’s Amazon EC2 instance security group violated company policy by allowing unrestricted incoming SSH traffic.A security engineer must implement a near-real-time monitoring and alerting solution that will notify administrators of such violations.Which solution meets these requirements with the MOST operational efficiency?Read More →

Which solution will meet these requirements MOST cost-effectively?

2025-01-11
By: study aws cloud
On: January 11, 2025
In: SCS-C01
With: 0 Comments

A company runs a global ecommerce website that is hosted on AWS.The company uses Amazon CloudFront to serve content to its user base.The company wants to block inbound traffic from a specific set of countries to comply with recent data regulation policies.Which solution will meet these requirements MOST cost-effectively?Read More →

What should the security engineer do next to meet this requirement?

2025-01-11
By: study aws cloud
On: January 11, 2025
In: SCS-C01
With: 0 Comments

A company wants to monitor the deletion of customer managed CMKs.A security engineer must create an alarm that will notify the company before a CM׀ is deleted.The security engineer has configured the integration of AWS CloudTrail with Amazon CloudWatch.What should the security engineer do next to meet this requirement?Read More →

Which actions should the company take to secure the images to limit their distribution?

2025-01-11
By: study aws cloud
On: January 11, 2025
In: SCS-C01
With: 0 Comments

A company stores images for a website in an Amazon S3 bucket.The company is using Amazon CloudFront to serve the images to the end users.The company recently discovered that the images are being accessed form countries where the company does not have a distribution license.Which actions should the company take to secure the images to limit their distribution? (Choose two.)Read More →

Which issues that are related to the CMK could be reasons for the error?

2025-01-11
By: study aws cloud
On: January 11, 2025
In: SCS-C01
With: 0 Comments

A development team is using an AWS Key Management Service (AWS KMS) CMK to try to encrypt and decrypt a secure string parameter from AWS SystemsManager Parameter Store.However, the development team receives an error message on each attempt.Which issues that are related to the CMK could be reasons for the error? (Choose two.)Read More →

Which CMK-related issues could be responsible?

2025-01-11
By: study aws cloud
On: January 11, 2025
In: SCS-C01
With: 0 Comments

The Development team receives an error message each time the team members attempt to encrypt or decrypt a Secure String parameter from the SSMParameter Store by using an AWS KMS customer managed key (CMK).Which CMK-related issues could be responsible? (Choose two.)Read More →

Posts pagination

Previous 1 … 10 11 12 … 41 Next

Recent Posts

  • Which of the below mentioned statements helps the user disable connection draining on the ELB?
  • What change should the SysOps Administrator make to the company’s existing AWS setup to achieve this result?
  • How can the user configure this?
  • How can the user achieve DR?
  • What two actions could you take to rectify this?

Categories

  • CLF-C01
  • CLF-C02
  • DBS-C01
  • DOP-C01
  • DOP-C02
  • DVA-C01
  • DVA-C02
  • MLS-C01
  • SAA-C02
  • SAA-C03
  • SAP-C01
  • SAP-C02
  • SCS-C01
  • SOA-C01
  • SOA-C02

© 2025. Tip2Cloud doesn't offer any real exam questions. All questions & answers were supported by AI.