Skip to content
Tip 2 Cloud

Free study guides, practices test, sample questions

Primary Navigation Menu
Menu
  • Home
  • About us
  • Contact

Security Specialty (Page 40)

Home » Security Specialty

Which configuration steps should the security engineer take to accomplish this task?

2025-09-30
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company needs to use HTTPS when connecting to its web applications to meet compliance requirements.These web applications run in Amazon VPC onAmazon EC2 instances behind an Application Load Balancer (ALB).A security engineer wants to ensure that the load balancer will only accept connections over port 443, even if the ALB is mistakenly configured with an HTTP listener.Which configuration steps should the security engineer take to accomplish this task?Read More →

Which solution meets these criteria?

2025-09-30
By: study aws cloud
In: SCS-C01
With: 1 Comment

A security engineer must use AWS Key Management Service (AWS KMS) to design a key management solution for a set of Amazon Elastic Block Store (AmazonEBS) volumes that contain sensitive data.The solution needs to ensure that the key material automatically expires in 90 days.Which solution meets these criteria?Read More →

How can the security engineer meet these requirements?

2025-09-30
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company is running an Amazon RDS Multi-AZ DB instance inside a VPC.The DB instance is using two subnets that provide a default route to the internet through a NAT gateway.The company also has application servers that run on Amazon EC2 instances that use the RDS database.The company has deployed these EC2 instances into two other private subnets within the same VPC.These EC2 instances use a default route to access the internet through the same NAT gateway.Each subnet in the VPC uses its own unique route table.After a recent security audit, the company added a new security requirement.The DB instance must never be able to connect to the internet.A security engineer must make this change immediately without disrupting the application servers’ network traffic.How can the security engineer meet these requirements?Read More →

Which of the following actions could fix this issue?

2025-09-30
By: study aws cloud
In: SCS-C01
With: 1 Comment

A Security Engineer is troubleshooting a connectivity issue between a web server that is writing log files to the logging server in another VPC.The Engineer has confirmed that a peering relationship exists between the two VPCs.VPC flow logs show that requests sent from the web server are accepted by the logging server, but the web server never receives a reply.Which of the following actions could fix this issue?Read More →

What should the Security Engineer do to restore the deleted key material?

2025-09-30
By: study aws cloud
In: SCS-C01
With: 1 Comment

A Security Engineer accidentally deleted the imported key material in an AWS KMS CMK.What should the Security Engineer do to restore the deleted key material?Read More →

How can the CISO be assured that AWS KMS and Amazon S3 are addressing the concerns?

2025-09-30
By: study aws cloud
In: SCS-C01
With: 1 Comment

An organization has a multi-petabyte workload that it is moving to Amazon S3, but the CISO is concerned about cryptographic wear-out and the blast radius if a key is compromised.How can the CISO be assured that AWS KMS and Amazon S3 are addressing the concerns? (Choose two.)Read More →

Which actions should the Security Analyst take to meet these requirements?

2025-09-30
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company’s Chief Security Officer has requested that a Security Analyst review and improve the security posture of each company AWS account.The SecurityAnalyst decides to do this by improving AWS account root user security.Which actions should the Security Analyst take to meet these requirements? (Choose three.)Read More →

How can this task be accomplished?

2025-09-30
By: study aws cloud
In: SCS-C01
With: 1 Comment

A large company wants its Compliance team to audit its Amazon S3 buckets to identify if personally identifiable information (PII) is stored in them.The company has hundreds of S3 buckets and has asked the Security Engineers to scan every bucket.How can this task be accomplished?Read More →

Why were there no alerts on the sudo commands?

2025-09-30
By: study aws cloud
In: SCS-C01
With: 1 Comment

During a manual review of system logs from an Amazon Linux EC2 instance, a Security Engineer noticed that there are sudo commands that were never properly alerted or reported on the Amazon CloudWatch Logs agent.Why were there no alerts on the sudo commands?Read More →

What should the company do to accomplish this?

2025-09-30
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company has an AWS account and allows a third-party contractor, who uses another AWS account, to assume certain IAM roles.The company wants to ensure that IAM roles can be assumed by the contractor only if the contractor has multi-factor authentication enabled on their IAM user accounts.What should the company do to accomplish this?Read More →

Posts pagination

Previous 1 … 39 40 41 Next

Recent Posts

  • What should a solutions architect do to meet these requirements?
  • What should a solutions architect do to meet these requirements?
  • Which solution will meet these requirements?
  • What should be done to secure the root user?
  • What should the solutions architect do to maximize reliability of the application’s infrastructure?

Categories

  • CLF-C01
  • CLF-C02
  • DBS-C01
  • DOP-C01
  • DOP-C02
  • DVA-C01
  • DVA-C02
  • MLS-C01
  • SAA-C02
  • SAA-C03
  • SAP-C01
  • SAP-C02
  • SCS-C01
  • SOA-C01
  • SOA-C02

© 2025. Tip2Cloud doesn't offer any real exam questions. All questions & answers were supported by AI.