Skip to content
Tip 2 Cloud

Learn & move to cloud

Security Specialty (Page 35)

What should the security engineer recommend?

2025-01-07
By: study aws cloud
On: January 7, 2025
In: SCS-C01
With: 0 Comments

A company is building an application on AWS that will store sensitive information.The company has a support team with access to the IT infrastructure, including databases.The company’s security engineer must introduce measures to protect the sensitive data against any data breach while minimizing management overhead.The credentials must be regularly rotated.What should the security engineer recommend?Read More →

What is the likely cause of this access denial?

2025-01-07
By: study aws cloud
On: January 7, 2025
In: SCS-C01
With: 0 Comments

A Security Engineer creates an Amazon S3 bucket policy that denies access to all users.A few days later, the Security Engineer adds an additional statement to the bucket policy to allow read-only access to one other employee.Even after updating the policy, the employee still receives an access denied message.What is the likely cause of this access denial?Read More →

Which solution will meet these requirements?

2025-01-07
By: study aws cloud
On: January 7, 2025
In: SCS-C01
With: 0 Comments

A company is using an organization in AWS Organizations that contains 100 accounts.The company has configured trusted access for Amazon GuardDuty to AWS Organizations within the management account.The company has designated a member account to be the GuardDuty administrator for the organization.GuardDuty is working properly and reports findings for the organization in the GaurdDuty console.The company wants a SecOps team to receive real-time email alerts from any GuardDuty finding within the organization that is high severity according the GuardDuty severity levels.Which solution will meet these requirements?Read More →

Which steps should the security engineer take to satisfy this requirement maintaining least privilege?

2025-01-07
By: study aws cloud
On: January 7, 2025
In: SCS-C01
With: 0 Comments

A security engineer has been tasked with implementing a solution that allows the company’s development team to have interactive command line access toAmazon EC2 Linux instances using the AWS Management Console.Which steps should the security engineer take to satisfy this requirement maintaining least privilege?Read More →

An error occurred (OperationNotPermitted) when calling the ModifySnapshotAttribute operation: Encrypted snapshots with EBS default key cannot be shared`Which combination of steps should the security engineer take in the incident account to complete the sharing operation?

2025-01-07
By: study aws cloud
On: January 7, 2025
In: SCS-C01
With: 0 Comments

A company needs its Amazon Elastic Block Store (Amazon EBS) volumes to be encrypted at all times.During a security incident, EBS snapshots of suspicious instances are shared to a forensics account for analysis.A security engineer attempting to share a suspicious EBS snapshot to the forensics account receives the following error:`Unable to share snapshot.An error occurred (OperationNotPermitted) when calling the ModifySnapshotAttribute operation: Encrypted snapshots with EBS default key cannot be shared`Which combination of steps should the security engineer take in the incident account to complete the sharing operation? (Choose three.)Read More →

“Which combination of steps should the security engineer take in the incident account to complete the sharing operation?

2025-01-07
By: study aws cloud
On: January 7, 2025
In: SCS-C01
With: 0 Comments

A company needs its Amazon Elastic Block Store (Amazon EBS) volumes to be encrypted at all times.During a security incident, a security engineer attempts to share a snapshot of a suspicious EBS volume to the company’s forensics account for analysis.The security engineer receives the following error:”Unable to share snapshot: An error occurred (OperationNotPermitted) when calling the ModifySnapshotAttribute operation: Encrypted snapshots with EBS default key cannot be shared.”Which combination of steps should the security engineer take in the incident account to complete the sharing operation? (Choose three.)Read More →

Which combination of AWS services and features should a security engineer use to provide and display the information to the security team?

2025-01-07
By: study aws cloud
On: January 7, 2025
In: SCS-C01
With: 0 Comments

A company has a large number of Amazon S3 buckets and a large number of objects in each S3 bucket.The company’s security team wants to analyze the access patterns for the objects and buckets.These patterns include the most frequently accessed buckets and objects, the largest 100 objects downloaded, and the objects with the longest download time from public IP addresses.The security team wants to view this information in a dashboard that is based on predetermined simple SQL queries.Which combination of AWS services and features should a security engineer use to provide and display the information to the security team? (Choose three.)Read More →

Which combination of controls should be used to protect against tampering with and unauthorized access to log files?

2025-01-07
By: study aws cloud
On: January 7, 2025
In: SCS-C01
With: 0 Comments

A Security Engineer is defining the logging solution for a newly developed product.Systems Administrators and Developers need to have appropriate access to event log files in AWS CloudTrail to support and troubleshoot the product.Which combination of controls should be used to protect against tampering with and unauthorized access to log files? (Choose two.)Read More →

Which of the following services meets these requirements?

2025-01-07
By: study aws cloud
On: January 7, 2025
In: SCS-C01
With: 0 Comments

A Security Architect is evaluating managed solutions for storage of encryption keys.The requirements are:-Storage is accessible by using only VPCs.-Service has tamper-evident controls.-Access logging is enabled.-Storage has high availability.Which of the following services meets these requirements?Read More →

What must be done to prevent users from accessing the S3 objects directly by using URLs?

2025-01-07
By: study aws cloud
On: January 7, 2025
In: SCS-C01
With: 0 Comments

In response to the past DDoS attack experiences, a Security Engineer has set up an Amazon CloudFront distribution for an Amazon S3 bucket.There is concern that some users may bypass the CloudFront distribution and access the S3 bucket directly.What must be done to prevent users from accessing the S3 objects directly by using URLs?Read More →

Posts pagination

Previous 1 … 34 35 36 … 41 Next

Recent Posts

  • Which of the below mentioned statements helps the user disable connection draining on the ELB?
  • What change should the SysOps Administrator make to the company’s existing AWS setup to achieve this result?
  • How can the user configure this?
  • How can the user achieve DR?
  • What two actions could you take to rectify this?

Categories

  • CLF-C01
  • CLF-C02
  • DBS-C01
  • DOP-C01
  • DOP-C02
  • DVA-C01
  • DVA-C02
  • MLS-C01
  • SAA-C02
  • SAA-C03
  • SAP-C01
  • SAP-C02
  • SCS-C01
  • SOA-C01
  • SOA-C02

© 2025. Tip2Cloud doesn't offer any real exam questions. All questions & answers were supported by AI.