Skip to content
Tip 2 Cloud

Learn & move to cloud

Security Specialty (Page 24)

Which combination of steps should the security team take?

2025-01-09
By: study aws cloud
On: January 9, 2025
In: SCS-C01
With: 0 Comments

A company wants to deploy an application in a private VPC that will not be connected to the internet.The company’s security team will not allow bastion hosts or methods using SSH to log in to Amazon EC2 instances.The application team plans to use AWS Systems Manager Session Manager to connect to and manage the EC2 instances.Which combination of steps should the security team take? (Choose three.)Read More →

How can this be accomplished?

2025-01-09
By: study aws cloud
On: January 9, 2025
In: SCS-C01
With: 0 Comments

A Security Engineer must design a solution that enables the incident Response team to audit for changes to a user’s IAM permissions in the case of a security incident.How can this be accomplished?Read More →

Which steps should be taken to troubleshoot the issue?

2025-01-09
By: study aws cloud
On: January 9, 2025
In: SCS-C01
With: 0 Comments

An organization is using Amazon CloudWatch Logs with agents deployed on its Linux Amazon EC2 instances.The agent configuration files have been checked and the application log files to be pushed are configured correctly.A review has identified that logging from specific instances is missing.Which steps should be taken to troubleshoot the issue? (Choose two.)Read More →

Which solution should the security engineer recommend?

2025-01-09
By: study aws cloud
On: January 9, 2025
In: SCS-C01
With: 0 Comments

A company has two AWS accounts: Account A and Account B.Account A has an IAM role that IAM users in Account B assume when they need to upload sensitive documents to Amazon S3 buckets in Account A.A new requirement mandates that users can assume the role only if they are authenticated with multi-factor authentication (MFA).A security engineer must recommend a solution that meets this requirement with minimum risk and effort.Which solution should the security engineer recommend?Read More →

Which steps should the security engineer take to meet these requirements?

2025-01-09
By: study aws cloud
On: January 9, 2025
In: SCS-C01
With: 0 Comments

A security engineer has enabled AWS Security Hub in their AWS account, and has enabled the Center for Internet Security (CIS) AWS Foundations compliance standard.No evaluation results on compliance are returned in the Security Hub console after several hours.The engineer wants to ensure that Security Hub can evaluate their resources for CIS AWS Foundations compliance.Which steps should the security engineer take to meet these requirements?Read More →

How should the security team prevent privilege escalation for both teams?

2025-01-09
By: study aws cloud
On: January 9, 2025
In: SCS-C01
With: 0 Comments

A company’s development team is designing an application using AWS Lambda and Amazon Elastic Container Service (Amazon ECS).The development team needs to create IAM roles to support these systems.The company’s security team wants to allow the developers to build IAM roles directly, but the security team wants to retain control over the permissions the developers can delegate to those roles.The development team needs access to more permissions than those required for application’s AWS services.The solution must minimize management overhead.How should the security team prevent privilege escalation for both teams?Read More →

Which policies or ACL should a security engineer review and modify to resolve this issue?

2025-01-09
By: study aws cloud
On: January 9, 2025
In: SCS-C01
With: 0 Comments

An application team is developing an internal application in its AWS account.Employees will use the application to access their employee benefits information.The application has an Amazon S3 bucket that is encrypted with an AWS Key Management Service (AWS KMS) customer managed key.The application team has configured an S3 gateway VPC endpoint for the application to use.During testing, an IAM user is unable to download objects from the S3 bucket by using the AWS Management Console.However, other IAM users in the same AWS account can download objects from the S3 bucket.Which policies or ACL should a security engineer review and modify to resolve this issue? (Choose three.)Read More →

What is the MOST secure way for a security engineer to implement this functionality?

2025-01-09
By: study aws cloud
On: January 9, 2025
In: SCS-C01
With: 0 Comments

A web application gives users the ability to log in, verify their membership’s validity, and browse artifacts that are stored in an Amazon S3 bucket.When a user attempts to download an object, the application must verify the permission to access the object and allow the user to download the object from a custom domain name such as example.com.What is the MOST secure way for a security engineer to implement this functionality?Read More →

What should the security engineer do next to meet these requirements?

2025-01-09
By: study aws cloud
On: January 9, 2025
In: SCS-C01
With: 0 Comments

A company’s application uses Amazon DynamoDB to store data.The company’s security policy requires all data to be encrypted at rest.The security policy also requires the company to use an on-premises hardware security module (HSM) to generate and manage the company’s encryption keys.A security engineer uses the on-premises HSM to generate an encryption key.What should the security engineer do next to meet these requirements?Read More →

Which solution will meet these requirements with the LEAST operational overhead?

2025-01-09
By: study aws cloud
On: January 9, 2025
In: SCS-C01
With: 0 Comments

A company wants to protect its website from man-in-the-middle attacks by using Amazon CloudFront.Which solution will meet these requirements with the LEAST operational overhead?Read More →

Posts pagination

Previous 1 … 23 24 25 … 41 Next

Recent Posts

  • Which of the below mentioned statements helps the user disable connection draining on the ELB?
  • What change should the SysOps Administrator make to the company’s existing AWS setup to achieve this result?
  • How can the user configure this?
  • How can the user achieve DR?
  • What two actions could you take to rectify this?

Categories

  • CLF-C01
  • CLF-C02
  • DBS-C01
  • DOP-C01
  • DOP-C02
  • DVA-C01
  • DVA-C02
  • MLS-C01
  • SAA-C02
  • SAA-C03
  • SAP-C01
  • SAP-C02
  • SCS-C01
  • SOA-C01
  • SOA-C02

© 2025. Tip2Cloud doesn't offer any real exam questions. All questions & answers were supported by AI.