Skip to content
Tip 2 Cloud

Free study guides, practices test, sample questions

Primary Navigation Menu
Menu
  • Home
  • About us
  • Contact

Security Specialty (Page 9)

Home » Security Specialty

What is a possible cause of the issue?

2025-10-14
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company has an encrypted Amazon S3 bucket.An Application Developer has an IAM policy that allows access to the S3 bucket, but the Application Developer is unable to access objects within the bucket.What is a possible cause of the issue?Read More →

Which combination of steps is required to ensure availability of the certificate in the CloudFront console?

2025-10-13
By: study aws cloud
In: SCS-C01
With: 1 Comment

A Web Administrator for the website example.com has created an Amazon CloudFront distribution for dev.example.com, with a requirement to configure HTTPS using a custom TLS certificate imported to AWS Certificate Manager.Which combination of steps is required to ensure availability of the certificate in the CloudFront console? (Choose two.)Read More →

Which set of steps should a security engineer take to troubleshoot the issue?

2025-10-13
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company is hosting a set of application, database, and web server instances in the AWS Cloud.Each set of instances has separate security groups.The company has properly defined the network ACLs.The company discovers an issue with the communication between the application and database instances.Which set of steps should a security engineer take to troubleshoot the issue?Read More →

How should the Security Engineer implement employee-only access to this system without changing the application?

2025-10-13
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company has several workloads running on AWS.Employees are required to authenticate using on-premises ADFS and SSO to access the AWS ManagementConsole.Developers migrated an existing legacy web application to an Amazon EC2 instance.Employees need to access this application from anywhere on the internet, but currently, there is no authentication system built into the application.How should the Security Engineer implement employee-only access to this system without changing the application?Read More →

Which solution will meet these requirements?

2025-10-13
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company is using an AWS owned CMK in its application to encrypt files in an AWS account.The company’s security team wants to have the ability to change to new key material for new files whenever there is a potential key breach.A security engineer must implement a solution that gives the security team the ability to change the key whenever the team wants to do so.Which solution will meet these requirements?Read More →

What should the security engineer do to confirm that the IMDSv1 endpoint is no longer being used?

2025-10-13
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company is migrating its Amazon EC2 based applications to use Instance Metadata Service Version 2 (IMDSv2).A security engineer needs to determine whether any of the EC2 instances are still using Instance Metadata Service Version 1 (IMDSv1).What should the security engineer do to confirm that the IMDSv1 endpoint is no longer being used?Read More →

Which solution will meet these requirements MOST cost-effectively?

2025-10-13
By: study aws cloud
In: SCS-C01
With: 1 Comment

A company recently began using Amazon Route 53 as its DNS provider.The company must log public DNS queries that Route 53 receives.The company has activated Route 53 public DNS query logging.The queries must be stored in a highly durable storage solution that deletes logs that are older than 1 year.Which solution will meet these requirements MOST cost-effectively?Read More →

Which of the following actions should the Engineer perform to get further guidance?

2025-10-13
By: study aws cloud
In: SCS-C01
With: 1 Comment

A Security Engineer is trying to determine whether the encryption keys used in an AWS service are in compliance with certain regulatory standards.Which of the following actions should the Engineer perform to get further guidance?Read More →

Which solution is the SIMPLEST way to allow the authentication of users using their social media identities?

2025-10-13
By: study aws cloud
In: SCS-C01
With: 1 Comment

The Security Engineer for a mobile game has to implement a method to authenticate users so that they can save their progress.Because most of the users are part of the same OpenID-Connect compatible social media website, the Security Engineer would like to use that as the identity provider.Which solution is the SIMPLEST way to allow the authentication of users using their social media identities?Read More →

What would resolve the connectivity issue?

2025-10-13
By: study aws cloud
In: SCS-C01
With: 1 Comment

A Software Engineer is trying to figure out why network connectivity to an Amazon EC2 instance does not appear to be working correctly.Its security group allows inbound HTTP traffic from 0.0.0.0/0, and the outbound rules have not been modified from the default.A custom network ACL associated with its subnet allows inbound HTTP traffic from 0.0.0.0/0 and has no outbound rules.What would resolve the connectivity issue?Read More →

Posts pagination

Previous 1 … 8 9 10 … 41 Next

Recent Posts

  • What should a solutions architect do to meet these requirements?
  • What should a solutions architect do to meet these requirements?
  • Which solution will meet these requirements?
  • What should be done to secure the root user?
  • What should the solutions architect do to maximize reliability of the application’s infrastructure?

Categories

  • CLF-C01
  • CLF-C02
  • DBS-C01
  • DOP-C01
  • DOP-C02
  • DVA-C01
  • DVA-C02
  • MLS-C01
  • SAA-C02
  • SAA-C03
  • SAP-C01
  • SAP-C02
  • SCS-C01
  • SOA-C01
  • SOA-C02

© 2025. Tip2Cloud doesn't offer any real exam questions. All questions & answers were supported by AI.