Skip to content
Tip 2 Cloud

Learn & move to cloud

Security Specialty (Page 34)

The mail application should be configured to connect to which of the following endpoints and corresponding ports?

2025-01-08
By: study aws cloud
On: January 8, 2025
In: SCS-C01
With: 0 Comments

A Systems Engineer has been tasked with configuring outbound mail through Simple Email Service (SES) and requires compliance with current TLS standards.The mail application should be configured to connect to which of the following endpoints and corresponding ports?Read More →

How can the Administrator restrict usage of member root user accounts across the organization?

2025-01-08
By: study aws cloud
On: January 8, 2025
In: SCS-C01
With: 0 Comments

A Security Administrator is restricting the capabilities of company root user accounts.The company uses AWS Organizations and has enabled it for all feature sets, including consolidated billing.The top-level account is used for billing and administrative purposes, not for operational AWS resource purposes.How can the Administrator restrict usage of member root user accounts across the organization?Read More →

How should the Security Engineer collect a memory dump of the EC2 instance for forensic analysis?

2025-01-08
By: study aws cloud
On: January 8, 2025
In: SCS-C01
With: 0 Comments

After multiple compromises of its Amazon EC2 instances, a company’s Security Officer is mandating that memory dumps of compromised instances be captured for further analysis.A Security Engineer just received an EC2 abuse notification report from AWS stating that an EC2 instance running the most recent WindowsServer 2019 Base AMI is compromised.How should the Security Engineer collect a memory dump of the EC2 instance for forensic analysis?Read More →

How can the InfoSec team ensure compliance with this mandate?

2025-01-08
By: study aws cloud
On: January 8, 2025
In: SCS-C01
With: 0 Comments

The InfoSec team has mandated that in the future only approved Amazon Machine Images (AMIs) can be used.How can the InfoSec team ensure compliance with this mandate?Read More →

Which solution will meet these requirements?

2025-01-08
By: study aws cloud
On: January 8, 2025
In: SCS-C01
With: 0 Comments

A company hosts business-critical applications on Amazon EC2 instances in a VPC.The VPC uses default DHCP options sets.A security engineer needs to log all DNS queries that internal resources make in the VPC.The security engineer also must create a list of the most common DNS queries over time.Which solution will meet these requirements?Read More →

How can an AWS KMS customer master key (CMK) be constrained to work with only Amazon S3?

2025-01-08
By: study aws cloud
On: January 8, 2025
In: SCS-C01
With: 0 Comments

An Application team has requested a new AWS KMS master key for use with Amazon S3, but the organizational security policy requires separate master keys for different AWS services to limit blast radius.How can an AWS KMS customer master key (CMK) be constrained to work with only Amazon S3?Read More →

Which solution will meet these requirements with the LEAST operational overhead?

2025-01-08
By: study aws cloud
On: January 8, 2025
In: SCS-C01
With: 0 Comments

A company’s security engineer must record when specific AWS Lambda functions are invoked.The logs must include the AWS principal that invoked the function.External sources and the company’s developers deliver the Lambda function code by using a variety of languages such as Python, Node.js, and Golang.The security engineer has created an AWS CloudTrail trail with default configuration for the AWS account.Which solution will meet these requirements with the LEAST operational overhead?Read More →

Assuming that AWS Certificate Manager is used, how many certificates will need to be generated?

2025-01-08
By: study aws cloud
On: January 8, 2025
In: SCS-C01
With: 0 Comments

A Solutions Architect is designing a web application that uses Amazon CloudFront, an Elastic Load Balancing Application Load Balancer, and an Auto Scaling group of Amazon EC2 instances.The load balancer and EC2 instances are in the US West (Oregon) region.It has been decided that encryption in transit is necessary by using a customer-branded domain name from the client to CloudFront and from CloudFront to the load balancer.Assuming that AWS Certificate Manager is used, how many certificates will need to be generated?Read More →

Which solution will meet these requirements?

2025-01-07
By: study aws cloud
On: January 7, 2025
In: SCS-C01
With: 0 Comments

A company is hosting multiple applications within a single VPC in its AWS account.The applications are running behind an Application Load Balancer that is associated with an AWS WAF web ACL.The company’s security team has identified that multiple port scans are originating from a specific range of IP addresses on the internet.A security engineer needs to deny access from the offending IP addresses.Which solution will meet these requirements?Read More →

Which solution will meet these requirements?

2025-01-07
By: study aws cloud
On: January 7, 2025
In: SCS-C01
With: 0 Comments

A company decides to use AWS Key Management Service (AWS KMS) for data encryption operations.The company must create a KMS key and automate the rotation of the key.The company also needs the ability to deactivate the key and schedule the key for deletion.Which solution will meet these requirements?Read More →

Posts pagination

Previous 1 … 33 34 35 … 41 Next

Recent Posts

  • Which of the below mentioned statements helps the user disable connection draining on the ELB?
  • What change should the SysOps Administrator make to the company’s existing AWS setup to achieve this result?
  • How can the user configure this?
  • How can the user achieve DR?
  • What two actions could you take to rectify this?

Categories

  • CLF-C01
  • CLF-C02
  • DBS-C01
  • DOP-C01
  • DOP-C02
  • DVA-C01
  • DVA-C02
  • MLS-C01
  • SAA-C02
  • SAA-C03
  • SAP-C01
  • SAP-C02
  • SCS-C01
  • SOA-C01
  • SOA-C02

© 2025. Tip2Cloud doesn't offer any real exam questions. All questions & answers were supported by AI.