Skip to content
Tip 2 Cloud

Free study guides, practices test, sample questions

Primary Navigation Menu
Menu
  • Home
  • About us
  • Contact

Security Specialty (Page 24)

Home » Security Specialty

How can the security engineer limit the number of requests from a specific IP address without blocking the IP address?

2025-10-06
By: study aws cloud
In: SCS-C01
With: 1 Comment

A security engineer has noticed an unusually high amount of traffic coming from a single IP address.This was discovered by analyzing the Application LoadBalancer’s access logs.How can the security engineer limit the number of requests from a specific IP address without blocking the IP address?Read More →

How should access be granted?

2025-10-06
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company manages three separate AWS accounts for its production, development, and test environments.Each Developer is assigned a unique IAM user under the development account.A new application hosted on an Amazon EC2 instance in the development account requires read access to the archived documents stored in an Amazon S3 bucket in the production account.How should access be granted?Read More →

What could have been done to detect and automatically remediate the incident?

2025-10-06
By: study aws cloud
In: SCS-C01
With: 1 Comment

During a recent internal investigation, it was discovered that all API logging was disabled in a production account, and the root user had created new API keys that appear to have been used several times.What could have been done to detect and automatically remediate the incident?Read More →

Which steps should be taken to troubleshoot the issue?

2025-10-06
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company has multiple production AWS accounts.Each account has AWS CloudTrail configured to log to a single Amazon S3 bucket in a central account.Two of the production accounts have trails that are not logging anything to the S3 bucket.Which steps should be taken to troubleshoot the issue? (Choose three.)Read More →

What steps are necessary to identify the cause of this phenomenon?

2025-10-06
By: study aws cloud
In: SCS-C01
With: 1 Comment

Amazon CloudWatch Logs agent is successfully delivering logs to the CloudWatch Logs service.However, logs stop being delivered after the associated log stream has been active for a specific number of hours.What steps are necessary to identify the cause of this phenomenon? (Choose two.)Read More →

Which of the following minimizes the potential attack surface for applications?

2025-10-06
By: study aws cloud
In: SCS-C01
With: 1 Comment

Which of the following minimizes the potential attack surface for applications?Read More →

Which of the following are valid event sources that are associated with web access control lists that trigger AWS WAF rules?

2025-10-06
By: study aws cloud
In: SCS-C01
With: 1 Comment

Which of the following are valid event sources that are associated with web access control lists that trigger AWS WAF rules? (Choose two.)Read More →

What would be the BEST way to reduce the potential impact of these attacks in the future?

2025-10-06
By: study aws cloud
In: SCS-C01
With: 1 Comment

A distributed web application is installed across several EC2 instances in public subnets residing in two Availability Zones.Apache logs show several intermittent brute-force attacks from hundreds of IP addresses at the layer 7 level over the past six months.What would be the BEST way to reduce the potential impact of these attacks in the future?Read More →

How would the organization manage its resources in the MOST secure manner?

2025-10-06
By: study aws cloud
In: SCS-C01
With: 1 Comment

A financial institution has the following security requirements:✑ Cloud-based users must be contained in a separate authentication domain.✑ Cloud-based users cannot access on-premises systems.As part of standing up a cloud environment, the financial institution is creating a number of Amazon managed databases and Amazon EC2 instances.An ActiveDirectory service exists on-premises that has all the administrator accounts, and these must be able to access the databases and instances.How would the organization manage its resources in the MOST secure manner? (Choose two.)Read More →

What is the most efficient way to remediate the risk of this activity?

2025-10-06
By: study aws cloud
In: SCS-C01
With: 1 Comment

A Security Engineer discovers that developers have been adding rules to security groups that allow SSH and RDP traffic from 0.0.0.0/0 instead of the organization firewall IP.What is the most efficient way to remediate the risk of this activity?Read More →

Posts pagination

Previous 1 … 23 24 25 … 41 Next

Recent Posts

  • What should a solutions architect do to meet these requirements?
  • What should a solutions architect do to meet these requirements?
  • Which solution will meet these requirements?
  • What should be done to secure the root user?
  • What should the solutions architect do to maximize reliability of the application’s infrastructure?

Categories

  • CLF-C01
  • CLF-C02
  • DBS-C01
  • DOP-C01
  • DOP-C02
  • DVA-C01
  • DVA-C02
  • MLS-C01
  • SAA-C02
  • SAA-C03
  • SAP-C01
  • SAP-C02
  • SCS-C01
  • SOA-C01
  • SOA-C02

© 2025. Tip2Cloud doesn't offer any real exam questions. All questions & answers were supported by AI.