Skip to content
Tip 2 Cloud

Learn & move to cloud

SCS-C01 (Page 37)

What should the Security Engineer do to meet these requirements?

2025-01-07
By: study aws cloud
On: January 7, 2025
In: SCS-C01
With: 0 Comments

A company is operating an open-source software platform that is internet facing.The legacy software platform no longer receives security updates.The software platform operates using Amazon Route 53 weighted load balancing to send traffic to two Amazon EC2 instances that connect to an Amazon RDS cluster.A recent report suggests this software platform is vulnerable to SQL injection attacks, with samples of attacks provided.The company’s Security Engineer must secure this system against SQL injection attacks within 24 hours.The Security Engineer’s solution must involve the least amount of effort and maintain normal operations during implementation.What should the Security Engineer do to meet these requirements?Read More →

Which solution meets these requirements?

2025-01-07
By: study aws cloud
On: January 7, 2025
In: SCS-C01
With: 0 Comments

A company is developing an ecommerce application.The application uses Amazon EC2 instances and an Amazon RDS MySQL database.For compliance reasons, data must be secured in transit and at rest.The company needs a solution that minimizes operational overhead and minimizes cost.Which solution meets these requirements?Read More →

Which combination of steps should the security engineer take to resolve the issue?

2025-01-07
By: study aws cloud
On: January 7, 2025
In: SCS-C01
With: 0 Comments

Unapproved changes were previously made to a company’s Amazon S3 bucket.A security engineer configured AWS Config to record configuration changes made to the company’s S3 buckets.The engineer discovers there are S3 configuration changes being made, but no Amazon SNS notifications are being sent.The engineer has already checked the configuration of the SNS topic and has confirmed the configuration is valid.Which combination of steps should the security engineer take to resolve the issue? (Choose two.)Read More →

How should the security team securely store the API key?

2025-01-07
By: study aws cloud
On: January 7, 2025
In: SCS-C01
With: 0 Comments

A company’s policy requires that all API keys be encrypted and stored separately from source code in a centralized security account.This security account is managed by the company’s security team.However, an audit revealed that an API key is stored with the source code of an AWS Lambda function in an AWSCodeCommit repository in the DevOps account.How should the security team securely store the API key?Read More →

Which approach should the security officer take to meet these requirements?

2025-01-07
By: study aws cloud
On: January 7, 2025
In: SCS-C01
With: 0 Comments

A company is outsourcing its operational support to an external company.The company’s security officer must implement an access solution for delegating operational support that minimizes overhead.Which approach should the security officer take to meet these requirements?Read More →

Which solution meets these requirements?

2025-01-07
By: study aws cloud
On: January 7, 2025
In: SCS-C01
With: 0 Comments

A company is using Amazon Elastic Container Service (Amazon ECS) to deploy an application that deals with sensitive data.During a recent security audit, the company identified a security issue in which Amazon RDS credentials were stored with the application code in the company’s source code repository.A security engineer needs to develop a solution to ensure that database credentials are stored securely and rotated periodically.The credentials should be accessible to the application only.The engineer also needs to prevent database administrators from sharing database credentials as plaintext with other teammates.The solution must also minimize administrative overhead.Which solution meets these requirements?Read More →

Which combination of actions will meet these requirements?

2025-01-07
By: study aws cloud
On: January 7, 2025
In: SCS-C01
With: 0 Comments

A software-as-a-service (SaaS) company hosts an application on AWS in a VPC.External customers will use the application on their own Amazon EC2 instances.To access the application, the customers need to install a client application on an EC2 instance in a VPC in their AWS accounts.A security engineer is designing a solution to allow communication between the client software and the SaaS application.The solution must maximize scalability and security.Which combination of actions will meet these requirements? (Choose two.)Read More →

Which solution would solve this problem?

2025-01-07
By: study aws cloud
On: January 7, 2025
In: SCS-C01
With: 0 Comments

A company has recently recovered from a security incident that required the restoration of Amazon EC2 instances from snapshots.After performing a gap analysis of its disaster recovery procedures and backup strategies, the company is concerned that, next time, it will not be able to recover the EC2 instances if the AWS account was compromised and Amazon EBS snapshots were deleted.All EBS snapshots are encrypted using an AWS KMS CMK.Which solution would solve this problem?Read More →

What should the security engineer do to correct this issue?

2025-01-07
By: study aws cloud
On: January 7, 2025
In: SCS-C01
With: 0 Comments

A company uses AWS Certificate Manager (ACM) to automate the renewal of SSL/TLS certificates that the company’s Elastic Load Balancers use.The company recently noticed that ACM was unable to automatically renew some certificates.These certificates have a status of “pending validation” in the ACM console.A security engineer configured the certificates by using DNS validation.The security engineer has verified that the existing certificates have not expired.What should the security engineer do to correct this issue?Read More →

Which solution will meet these requirements?

2025-01-07
By: study aws cloud
On: January 7, 2025
In: SCS-C01
With: 0 Comments

A company needs a cloud-based, managed desktop solution for its workforce of remote employees.The company wants to ensure that the employees can access the desktops only by using company-provided devices.A security engineer must design a solution that will minimize cost and management overhead.Which solution will meet these requirements?Read More →

Posts pagination

Previous 1 … 36 37 38 … 41 Next

Recent Posts

  • Which of the below mentioned statements helps the user disable connection draining on the ELB?
  • What change should the SysOps Administrator make to the company’s existing AWS setup to achieve this result?
  • How can the user configure this?
  • How can the user achieve DR?
  • What two actions could you take to rectify this?

Categories

  • CLF-C01
  • CLF-C02
  • DBS-C01
  • DOP-C01
  • DOP-C02
  • DVA-C01
  • DVA-C02
  • MLS-C01
  • SAA-C02
  • SAA-C03
  • SAP-C01
  • SAP-C02
  • SCS-C01
  • SOA-C01
  • SOA-C02

© 2025. Tip2Cloud doesn't offer any real exam questions. All questions & answers were supported by AI.