Skip to content
Tip 2 Cloud

Free study guides, practices test, sample questions

Primary Navigation Menu
Menu
  • Home
  • About us
  • Contact

Security Specialty (Page 13)

Home » Security Specialty

What steps should the Security Engineer take to check for known vulnerabilities and limit the attack surface?

2025-10-12
By: study aws cloud
In: SCS-C01
With: 1 Comment

The Security Engineer is managing a traditional three-tier web application that is running on Amazon EC2 instances.The application has become the target of increasing numbers of malicious attacks from the Internet.What steps should the Security Engineer take to check for known vulnerabilities and limit the attack surface? (Choose two.)Read More →

Which of the following approaches will provide alerts on any resources launched in an unapproved region?

2025-10-12
By: study aws cloud
In: SCS-C01
With: 1 Comment

For compliance reasons, an organization limits the use of resources to three specific AWS regions.It wants to be alerted when any resources are launched in unapproved regions.Which of the following approaches will provide alerts on any resources launched in an unapproved region?Read More →

How can the Security Engineer protect this workload so that only employees can access it?

2025-10-12
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company runs an application on AWS that needs to be accessed only by employees.Most employees work from the office, but others work remotely or travel.How can the Security Engineer protect this workload so that only employees can access it?Read More →

What configuration is necessary to allow the virtual security appliance to route the traffic?

2025-10-12
By: study aws cloud
In: SCS-C01
With: 1 Comment

A Systems Engineer is troubleshooting the connectivity of a test environment that includes a virtual security appliance deployed inline.In addition to using the virtual security appliance, the Development team wants to use security groups and network ACLs to accomplish various security requirements in the environment.What configuration is necessary to allow the virtual security appliance to route the traffic?Read More →

What is the recommended method to ensure that each application has its own programmatic access control permissions on the KMS CMK?

2025-10-12
By: study aws cloud
In: SCS-C01
With: 1 Comment

An organization has three applications running on AWS, each accessing the same data on Amazon S3.The data on Amazon S3 is server-side encrypted by using an AWS KMS Customer Master Key (CMK).What is the recommended method to ensure that each application has its own programmatic access control permissions on the KMS CMK?Read More →

Which of the following mitigations should be recommended?

2025-10-12
By: study aws cloud
In: SCS-C01
With: 1 Comment

Some highly sensitive analytics workloads are to be moved to Amazon EC2 hosts.Threat modeling has found that a risk exists where a subnet could be maliciously or accidentally exposed to the internet.Which of the following mitigations should be recommended?Read More →

What is the simplest and MOST secure way to decrypt this data when required?

2025-10-12
By: study aws cloud
In: SCS-C01
With: 1 Comment

A Developer who is following AWS best practices for secure code development requires an application to encrypt sensitive data to be stored at rest, locally in the application, using AWS KMS.What is the simplest and MOST secure way to decrypt this data when required?Read More →

Which steps should be taken to investigate the suspected compromise?

2025-10-11
By: study aws cloud
In: SCS-C01
With: 1 Comment

An Amazon EC2 instance is part of an EC2 Auto Scaling group that is behind an Application Load Balancer (ALB).It is suspected that the EC2 instance has been compromised.Which steps should be taken to investigate the suspected compromise? (Choose three.)Read More →

Which of the following steps will implement these requirements?

2025-10-11
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company has five AWS accounts and wants to use AWS CloudTrail to log API calls.The log files must be stored in an Amazon S3 bucket that resides in a new account specifically built for centralized services with a unique top-level prefix for each trail.The configuration must also enable detection of any modification to the logs.Which of the following steps will implement these requirements? (Choose three.)Read More →

Which approach will meet these requirements and priorities?

2025-10-11
By: study aws cloud
In: SCS-C01
With: 1 Comment

An application uses Amazon Cognito to manage end users’ permissions when directly accessing AWS resources, including Amazon DynamoDB.A new feature request reads as follows:Provide a mechanism to mark customers as suspended pending investigation or suspended permanently.Customers should still be able to log in when suspended, but should not be able to make changes.The priorities are to reduce complexity and avoid potential for future security issues.Which approach will meet these requirements and priorities?Read More →

Posts pagination

Previous 1 … 12 13 14 … 41 Next

Recent Posts

  • What should a solutions architect do to meet these requirements?
  • What should a solutions architect do to meet these requirements?
  • Which solution will meet these requirements?
  • What should be done to secure the root user?
  • What should the solutions architect do to maximize reliability of the application’s infrastructure?

Categories

  • CLF-C01
  • CLF-C02
  • DBS-C01
  • DOP-C01
  • DOP-C02
  • DVA-C01
  • DVA-C02
  • MLS-C01
  • SAA-C02
  • SAA-C03
  • SAP-C01
  • SAP-C02
  • SCS-C01
  • SOA-C01
  • SOA-C02

© 2025. Tip2Cloud doesn't offer any real exam questions. All questions & answers were supported by AI.