Skip to content
Tip 2 Cloud

Free study guides, practices test, sample questions

Primary Navigation Menu
Menu
  • Home
  • About us
  • Contact

Security Specialty (Page 29)

Home » Security Specialty

Which solution will meet these requirements?

2025-10-04
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company is observing frequent bursts of unusual traffic to its corporate website.The IP address ranges that inflate the requests keep changing, and the volumes of traffic are increasing.A security engineer needs to implement a solution to protect the website from a potential DDoS attack.The solution must rack the rate of requests from IP addresses.When the requests from a particular IP address exceed a specific rate, the solution must limit the amount of traffic that can reach the website from that IP address.Which solution will meet these requirements?Read More →

Which combination of steps should a security engineer take before investigating the issue?

2025-10-04
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company finds that one of its Amazon EC2 instances suddenly has a high CPU usage.The company does not know whether the EC2 instance is compromised or whether the operating system is performing background cleanup.Which combination of steps should a security engineer take before investigating the issue? (Choose three.)Read More →

Which of the following actions will address this requirement?

2025-10-04
By: study aws cloud
In: SCS-C01
With: 1 Comment

An organizational must establish the ability to delete an AWS KMS Customer Master Key (CMK) within a 24-hour timeframe to keep it from being used for encrypt or decrypt operations.Which of the following actions will address this requirement?Read More →

Which combination of the following would satisfy these requirements?

2025-10-04
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company uses Microsoft Active Directory for access management for on-premises resources, and wants to use the same mechanism for accessing its AWS accounts.Additionally, the Development team plans to launch a public-facing application for which they need a separate authentication solution.Which combination of the following would satisfy these requirements? (Choose two.)Read More →

How should a Security Engineer resolve these issues?

2025-10-04
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company recently performed an annual security assessment of its AWS environment.The assessment showed the audit logs are not available beyond 90 days and that unauthorized changes to IAM policies are made without detection.How should a Security Engineer resolve these issues?Read More →

`What will enable the Security Engineer to save the change?

2025-10-04
By: study aws cloud
In: SCS-C01
With: 1 Comment

A Security Engineer is asked to update an AWS CloudTrail log file prefix for an existing trail.When attempting to save the change in the CloudTrail console, theSecurity Engineer receives the following error message: `There is a problem with the bucket policy.`What will enable the Security Engineer to save the change?Read More →

Which AWS services should be used to meet these requirements?

2025-10-04
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company needs a forensic-logging solution for hundreds of applications running in Docker on Amazon EC2.The solution must perform real-time analytics on the logs, must support the replay of messages, and must persist the logs.Which AWS services should be used to meet these requirements? (Choose two.)Read More →

Which combination of activities must the company implement to meet its encryption requirements?

2025-10-04
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company’s architecture requires that its three Amazon EC2 instances run behind an Application Load Balancer (ALB).The EC2 instances transmit sensitive data between each other.Developers use SSL certificates to encrypt the traffic between the public users and the ALB.However, the Developers are unsure of how to encrypt the data in transit between the ALB and the EC2 instances and the traffic between the EC2 instances.Which combination of activities must the company implement to meet its encryption requirements? (Choose two.)Read More →

What could be causing these terminations?

2025-10-04
By: study aws cloud
In: SCS-C01
With: 1 Comment

A Security Engineer has launched multiple Amazon EC2 instances from a private AMI using an AWS CloudFormation template.The Engineer notices instances terminating right after they are launched.What could be causing these terminations?Read More →

What could be responsible for the connection failure?

2025-10-04
By: study aws cloud
In: SCS-C01
With: 1 Comment

Authorized Administrators are unable to connect to an Amazon EC2 Linux bastion host using SSH over the Internet.The connection either fails to respond or generates the following error message:Network error: Connection timed out.What could be responsible for the connection failure? (Choose three.)Read More →

Posts pagination

Previous 1 … 28 29 30 … 41 Next

Recent Posts

  • What should a solutions architect do to meet these requirements?
  • What should a solutions architect do to meet these requirements?
  • Which solution will meet these requirements?
  • What should be done to secure the root user?
  • What should the solutions architect do to maximize reliability of the application’s infrastructure?

Categories

  • CLF-C01
  • CLF-C02
  • DBS-C01
  • DOP-C01
  • DOP-C02
  • DVA-C01
  • DVA-C02
  • MLS-C01
  • SAA-C02
  • SAA-C03
  • SAP-C01
  • SAP-C02
  • SCS-C01
  • SOA-C01
  • SOA-C02

© 2025. Tip2Cloud doesn't offer any real exam questions. All questions & answers were supported by AI.