Skip to content
Tip 2 Cloud

Learn & move to cloud

SCS-C01 (Page 17)

What is the MOST efficient way to manage access control for the KMS CMK7?

2025-01-10
By: study aws cloud
On: January 10, 2025
In: SCS-C01
With: 0 Comments

A Security Engineer is working with the development team to design a supply chain application that stores sensitive inventory data in an Amazon S3 bucket.The application will use an AWS KMS customer master key (CMK) to encrypt the data on Amazon S3.The inventory data on Amazon S3 will be shared of vendors.All vendors will use AWS principals from their own AWS accounts to access the data on Amazon S3.The vendor list may change weekly, and the solution must support cross-account access.What is the MOST efficient way to manage access control for the KMS CMK7?Read More →

What is the MOST likely cause of the authentication errors?

2025-01-10
By: study aws cloud
On: January 10, 2025
In: SCS-C01
With: 0 Comments

A company’s database developer has just migrated an Amazon RDS database credential to be stored and managed by AWS Secrets Manager.The developer has also enabled rotation of the credential within the Secrets Manager console and set the rotation to change every 30 days.After a short period of time, a number of existing applications have failed with authentication errors.What is the MOST likely cause of the authentication errors?Read More →

What is the MOST cost-effective way to manage the storage of credentials?

2025-01-10
By: study aws cloud
On: January 10, 2025
In: SCS-C01
With: 0 Comments

A water utility company uses a number of Amazon EC2 instances to manage updates to a fleet of 2,000 Internet of Things (IoT) field devices that monitor water quality.These devices each have unique access credentials.An operational safety policy requires that access to specific credentials is independently auditable.What is the MOST cost-effective way to manage the storage of credentials?Read More →

What is the most efficient way to remediate the risk of this activity?

2025-01-10
By: study aws cloud
On: January 10, 2025
In: SCS-C01
With: 0 Comments

A Security Engineer discovers that developers have been adding rules to security groups that allow SSH and RDP traffic from 0.0.0.0/0 instead of the organization firewall IP.What is the most efficient way to remediate the risk of this activity?Read More →

How would the organization manage its resources in the MOST secure manner?

2025-01-10
By: study aws cloud
On: January 10, 2025
In: SCS-C01
With: 0 Comments

A financial institution has the following security requirements:✑ Cloud-based users must be contained in a separate authentication domain.✑ Cloud-based users cannot access on-premises systems.As part of standing up a cloud environment, the financial institution is creating a number of Amazon managed databases and Amazon EC2 instances.An ActiveDirectory service exists on-premises that has all the administrator accounts, and these must be able to access the databases and instances.How would the organization manage its resources in the MOST secure manner? (Choose two.)Read More →

What would be the BEST way to reduce the potential impact of these attacks in the future?

2025-01-10
By: study aws cloud
On: January 10, 2025
In: SCS-C01
With: 0 Comments

A distributed web application is installed across several EC2 instances in public subnets residing in two Availability Zones.Apache logs show several intermittent brute-force attacks from hundreds of IP addresses at the layer 7 level over the past six months.What would be the BEST way to reduce the potential impact of these attacks in the future?Read More →

Which of the following are valid event sources that are associated with web access control lists that trigger AWS WAF rules?

2025-01-10
By: study aws cloud
On: January 10, 2025
In: SCS-C01
With: 0 Comments

Which of the following are valid event sources that are associated with web access control lists that trigger AWS WAF rules? (Choose two.)Read More →

Which of the following minimizes the potential attack surface for applications?

2025-01-10
By: study aws cloud
On: January 10, 2025
In: SCS-C01
With: 0 Comments

Which of the following minimizes the potential attack surface for applications?Read More →

What steps are necessary to identify the cause of this phenomenon?

2025-01-10
By: study aws cloud
On: January 10, 2025
In: SCS-C01
With: 0 Comments

Amazon CloudWatch Logs agent is successfully delivering logs to the CloudWatch Logs service.However, logs stop being delivered after the associated log stream has been active for a specific number of hours.What steps are necessary to identify the cause of this phenomenon? (Choose two.)Read More →

Which steps should be taken to troubleshoot the issue?

2025-01-10
By: study aws cloud
On: January 10, 2025
In: SCS-C01
With: 0 Comments

A company has multiple production AWS accounts.Each account has AWS CloudTrail configured to log to a single Amazon S3 bucket in a central account.Two of the production accounts have trails that are not logging anything to the S3 bucket.Which steps should be taken to troubleshoot the issue? (Choose three.)Read More →

Posts pagination

Previous 1 … 16 17 18 … 41 Next

Recent Posts

  • Which of the below mentioned statements helps the user disable connection draining on the ELB?
  • What change should the SysOps Administrator make to the company’s existing AWS setup to achieve this result?
  • How can the user configure this?
  • How can the user achieve DR?
  • What two actions could you take to rectify this?

Categories

  • CLF-C01
  • CLF-C02
  • DBS-C01
  • DOP-C01
  • DOP-C02
  • DVA-C01
  • DVA-C02
  • MLS-C01
  • SAA-C02
  • SAA-C03
  • SAP-C01
  • SAP-C02
  • SCS-C01
  • SOA-C01
  • SOA-C02

© 2025. Tip2Cloud doesn't offer any real exam questions. All questions & answers were supported by AI.