Skip to content
Tip 2 Cloud

Free study guides, practices test, sample questions

Primary Navigation Menu
Menu
  • Home
  • About us
  • Contact

Security Specialty (Page 6)

Home » Security Specialty

Which approach should the team take to accomplish this task?

2025-10-15
By: study aws cloud
In: SCS-C01
With: 1 Comment

Amazon GuardDuty has detected communications to a known command and control endpoint from a company’s Amazon EC2 instance.The instance was found to be running a vulnerable version of a common web framework.The company’s security operations team wants to quickly identify other compute resources with the specific version of that framework installed.Which approach should the team take to accomplish this task?Read More →

Which application flow would meet the data protection requirements on AWS?

2025-10-15
By: study aws cloud
In: SCS-C01
With: 1 Comment

A pharmaceutical company has digitized versions of historical prescriptions stored on premises.The company would like to move these prescriptions to AWS and perform analytics on the data in them.Any operation with this data requires that the data be encrypted in transit and at rest.Which application flow would meet the data protection requirements on AWS?Read More →

What should the security engineer do to resolve this error?

2025-10-15
By: study aws cloud
In: SCS-C01
With: 1 Comment

A security engineer is attempting to push a Linux-based container image to an Amazon Elastic Container Registry (Amazon ECR) repository that is in the us-east-1 Region.The security engineer has retrieved an authentication token by using the aws ecr get-login-password AWS CLI command within the last 4 hours.The security engineer has confirmed that the correct permissions are in place to push the container image to the repository.When the security engineer tries to push the container image, the security engineer receives the following error: “no basic auth credentials”.What should the security engineer do to resolve this error?Read More →

What must be done to prevent users from accessing the S3 objects directly by using URLs?

2025-10-15
By: study aws cloud
In: SCS-C01
With: 1 Comment

In response to the past DDoS attack experiences, a Security Engineer has set up an Amazon CloudFront distribution for an Amazon S3 bucket.There is concern that some users may bypass the CloudFront distribution and access the S3 bucket directly.What must be done to prevent users from accessing the S3 objects directly by using URLs?Read More →

Which of the following services meets these requirements?

2025-10-14
By: study aws cloud
In: SCS-C01
With: 1 Comment

A Security Architect is evaluating managed solutions for storage of encryption keys.The requirements are:-Storage is accessible by using only VPCs.-Service has tamper-evident controls.-Access logging is enabled.-Storage has high availability.Which of the following services meets these requirements?Read More →

Which combination of controls should be used to protect against tampering with and unauthorized access to log files?

2025-10-14
By: study aws cloud
In: SCS-C01
With: 1 Comment

A Security Engineer is defining the logging solution for a newly developed product.Systems Administrators and Developers need to have appropriate access to event log files in AWS CloudTrail to support and troubleshoot the product.Which combination of controls should be used to protect against tampering with and unauthorized access to log files? (Choose two.)Read More →

Which combination of AWS services and features should a security engineer use to provide and display the information to the security team?

2025-10-14
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company has a large number of Amazon S3 buckets and a large number of objects in each S3 bucket.The company’s security team wants to analyze the access patterns for the objects and buckets.These patterns include the most frequently accessed buckets and objects, the largest 100 objects downloaded, and the objects with the longest download time from public IP addresses.The security team wants to view this information in a dashboard that is based on predetermined simple SQL queries.Which combination of AWS services and features should a security engineer use to provide and display the information to the security team? (Choose three.)Read More →

“Which combination of steps should the security engineer take in the incident account to complete the sharing operation?

2025-10-14
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company needs its Amazon Elastic Block Store (Amazon EBS) volumes to be encrypted at all times.During a security incident, a security engineer attempts to share a snapshot of a suspicious EBS volume to the company’s forensics account for analysis.The security engineer receives the following error:”Unable to share snapshot: An error occurred (OperationNotPermitted) when calling the ModifySnapshotAttribute operation: Encrypted snapshots with EBS default key cannot be shared.”Which combination of steps should the security engineer take in the incident account to complete the sharing operation? (Choose three.)Read More →

An error occurred (OperationNotPermitted) when calling the ModifySnapshotAttribute operation: Encrypted snapshots with EBS default key cannot be shared`Which combination of steps should the security engineer take in the incident account to complete the sharing operation?

2025-10-14
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company needs its Amazon Elastic Block Store (Amazon EBS) volumes to be encrypted at all times.During a security incident, EBS snapshots of suspicious instances are shared to a forensics account for analysis.A security engineer attempting to share a suspicious EBS snapshot to the forensics account receives the following error:`Unable to share snapshot.An error occurred (OperationNotPermitted) when calling the ModifySnapshotAttribute operation: Encrypted snapshots with EBS default key cannot be shared`Which combination of steps should the security engineer take in the incident account to complete the sharing operation? (Choose three.)Read More →

Which steps should the security engineer take to satisfy this requirement maintaining least privilege?

2025-10-14
By: study aws cloud
In: SCS-C01
With: 1 Comment

A security engineer has been tasked with implementing a solution that allows the company’s development team to have interactive command line access toAmazon EC2 Linux instances using the AWS Management Console.Which steps should the security engineer take to satisfy this requirement maintaining least privilege?Read More →

Posts pagination

Previous 1 … 5 6 7 … 41 Next

Recent Posts

  • What should a solutions architect do to meet these requirements?
  • What should a solutions architect do to meet these requirements?
  • Which solution will meet these requirements?
  • What should be done to secure the root user?
  • What should the solutions architect do to maximize reliability of the application’s infrastructure?

Categories

  • CLF-C01
  • CLF-C02
  • DBS-C01
  • DOP-C01
  • DOP-C02
  • DVA-C01
  • DVA-C02
  • MLS-C01
  • SAA-C02
  • SAA-C03
  • SAP-C01
  • SAP-C02
  • SCS-C01
  • SOA-C01
  • SOA-C02

© 2025. Tip2Cloud doesn't offer any real exam questions. All questions & answers were supported by AI.