Amazon AWS Certified Security - Specialty (Replaced with SCS-C03) SCS-C02 Exam Questions in PDF

Free Amazon SCS-C02 Dumps Questions (page: 4)

While securing the connection between a company’s VPC and its on-premises data center, a security engineer sent a ping command from an on-premises host (IP address 203.0.113.12) to an Amazon EC2 instance (IP address 172.31.16.139). The ping command did not return a response. The flow log in the VPC showed the following:
What action should be performed to allow the ping to work?

  1. In the security group of the EC2 instance, allow inbound ICMP traffic.
  2. In the security group of the EC2 instance, allow outbound ICMP traffic.
  3. In the VPC’s NACL, allow inbound ICMP traffic.
  4. In the VPC’s NACL, allow outbound ICMP traffic.

Answer(s): D



A company developed an application by using AWS Lambda, Amazon S3, Amazon Simple Notification Service (Amazon SNS), and Amazon DynamoDB. An external application puts objects into the company's S3 bucket and tags the objects with date and time. A Lambda function periodically pulls data from the company's S3 bucket based on date and time tags and inserts specific values into a DynamoDB table for further processing.
The data includes personally identifiable information (PII). The company must remove data that is older than 30 days from the S3 bucket and the DynamoDB table.
Which solution will meet this requirement with the MOST operational efficiency?

  1. Update the Lambda function to add a TTL S3 flag to S3 objects. Create an S3 Lifecycle policy to expire objects that are older than 30 days by using the TTL S3 flag.
  2. Create an S3 Lifecycle policy to expire objects that are older than 30 days. Update the Lambda function to add the TTL attribute in the DynamoDB table. Enable TTL on the DynamoDB table to expire entries that are older than 30 days based on the TTL attribute.
  3. Create an S3 Lifecycle policy to expire objects that are older than 30 days and to add all prefixes to the S3 bucket. Update the Lambda function to delete entries that are older than 30 days.
  4. Create an S3 Lifecycle policy to expire objects that are older than 30 days by using object tags. Update the Lambda function to delete entries that are older than 30 days.

Answer(s): B



What are the MOST secure ways to protect the AWS account root user of a recently opened AWS account? (Choose two.)

  1. Use the AWS account root user access keys instead of the AWS Management Console.
  2. Enable multi-factor authentication for the AWS IAM users with the AdministratorAccess managed policy attached to them.
  3. Use AWS KMS to encrypt all AWS account root user and AWS IAM access keys and set automatic rotation to 30 days.
  4. Do not create access keys for the AWS account root user; instead, create AWS IAM users.
  5. Enable multi-factor authentication for the AWS account root user.

Answer(s): D,E



A company is expanding its group of stores. On the day that each new store opens, the company wants to launch a customized web application for that store. Each store's application will have a non-production environment and a production environment. Each environment will be deployed in a separate AWS account. The company uses AWS Organizations and has an OU that is used only for these accounts.
The company distributes most of the development work to third-party development teams. A security engineer needs to ensure that each team follows the company's deployment plan for AWS resources. The security engineer also must limit access to the deployment plan to only the developers who need access. The security engineer already has created an AWS CloudFormation template that implements the deployment plan.
What should the security engineer do next to meet the requirements in the MOST secure way?

  1. Create an AWS Service Catalog portfolio in the organization's management account. Upload the CloudFormation template. Add the template to the portfolio's product list. Share the portfolio with the OU.
  2. Use the CloudFormation CLI to create a module from the CloudFormation template. Register the module as a private extension in the CloudFormation registry. Publish the extension. In the OU, create an SCP that allows access to the extension.
  3. Create an AWS Service Catalog portfolio in the organization's management account. Upload the CloudFormation template. Add the template to the portfolio's product list. Create an IAM role that has a trust policy that allows cross-account access to the portfolio for users in the OU accounts. Attach the AWSServiceCatalogEndUserFullAccess managed policy to the role.
  4. Use the CloudFormation CLI to create a module from the CloudFormation template. Register the module as a private extension in the CloudFormation registry. Publish the extension. Share the extension with the OU.

Answer(s): A



A team is using AWS Secrets Manager to store an application database password. Only a limited number of IAM principals within the account can have access to the secret. The principals who require access to the secret change frequently. A security engineer must create a solution that maximizes flexibility and scalability.
Which solution will meet these requirements?

  1. Use a role-based approach by creating an IAM role with an inline permissions policy that allows access to the secret. Update the IAM principals in the role trust policy as required.
  2. Deploy a VPC endpoint for Secrets Manager. Create and attach an endpoint policy that specifies the IAM principals that are allowed to access the secret. Update the list of IAM principals as required.
  3. Use a tag-based approach by attaching a resource policy to the secret. Apply tags to the secret and the IAM principals. Use the aws:PrincipalTag and aws:ResourceTag IAM condition keys to control access.
  4. Use a deny-by-default approach by using IAM policies to deny access to the secret explicitly. Attach the policies to an IAM group. Add all IAM principals to the IAM group. Remove principals from the group when they need access. Add the principals to the group again when access is no longer allowed.

Answer(s): C



A company is hosting a web application on Amazon EC2 instances behind an Application Load Balancer (ALB). The application has become the target of a DoS attack. Application logging shows that requests are coming from a small number of client IP addresses, but the addresses change regularly.
The company needs to block the malicious traffic with a solution that requires the least amount of ongoing effort.
Which solution meets these requirements?

  1. Create an AWS WAF rate-based rule, and attach it to the ALB.
  2. Update the security group that is attached to the ALB to block the attacking IP addresses.
  3. Update the ALB subnet's network ACL to block the attacking client IP addresses.
  4. Create an AWS WAF rate-based rule, and attach it to the security group of the EC2 instances.

Answer(s): A



A company has hundreds of AWS accounts in an organization in AWS Organizations. The company operates out of a single AWS Region. The company has a dedicated security tooling AWS account in the organization. The security tooling account is configured as the organization's delegated administrator for Amazon GuardDuty and AWS Security Hub. The company has configured the environment to automatically enable GuardDuty and Security Hub for existing AWS accounts and new AWS accounts.
The company is performing control tests on specific GuardDuty findings to make sure that the company's security team can detect and respond to security events. The security team launched an Amazon EC2 instance and attempted to run DNS requests against a test domain, example.com, to generate a DNS finding. However, the GuardDuty finding was never created in the Security Hub delegated administrator account.
Why was the finding was not created in the Security Hub delegated administrator account?

  1. VPC flow logs were not turned on for the VPC where the EC2 instance was launched.
  2. The VPC where the EC2 instance was launched had the DHCP option configured for a custom OpenDNS resolver.
  3. The GuardDuty integration with Security Hub was never activated in the AWS account where the finding was generated.
  4. Cross-Region aggregation in Security Hub was not configured.

Answer(s): B



An ecommerce company has a web application architecture that runs primarily on containers. The application containers are deployed on Amazon Elastic Container Service (Amazon ECS). The container images for the application are stored in Amazon Elastic Container Registry (Amazon ECR).
The company's security team is performing an audit of components of the application architecture. The security team identifies issues with some container images that are stored in the container repositories.
The security team wants to address these issues by implementing continual scanning and on-push scanning of the container images. The security team needs to implement a solution that makes any findings from these scans visible in a centralized dashboard. The security team plans to use the dashboard to view these findings along with other security-related findings that they intend to generate in the future. There are specific repositories that the security team needs to exclude from the scanning process.
Which solution will meet these requirements?

  1. Use Amazon Inspector. Create inclusion rules in Amazon ECR to match repositories that need to be scanned. Push Amazon Inspector findings to AWS Security Hub.
  2. Use ECR basic scanning of container images. Create inclusion rules in Amazon ECR to match repositories that need to be scanned. Push findings to AWS Security Hub.
  3. Use ECR basic scanning of container images. Create inclusion rules in Amazon ECR to match repositories that need to be scanned. Push findings to Amazon Inspector.
  4. Use Amazon Inspector. Create inclusion rules in Amazon Inspector to match repositories that need to be scanned. Push Amazon Inspector findings to AWS Config.

Answer(s): A



Share your comments for Amazon SCS-C02 exam with other users:

B
Bharat Kumar Saraf
10/31/2023 4:36:00 AM

some of the answers are incorrect. need to be reviewed.

J
JP
7/13/2023 12:21:00 PM

so far so good

K
Kiky V
8/8/2023 6:32:00 PM

i am really liking it

T
trying
7/28/2023 12:37:00 PM

thanks good stuff

E
exampei
10/4/2023 2:40:00 PM

need dump c_tadm_23

E
Eman Sawalha
6/10/2023 6:18:00 AM

next time i will write a full review

J
johnpaul
11/15/2023 7:55:00 AM

first time using this site

O
omiornil@gmail.com
7/25/2023 9:36:00 AM

please sent me oracle 1z0-1105-22 pdf

J
John
8/29/2023 8:59:00 PM

very helpful

K
Kvana
9/28/2023 12:08:00 PM

good info about oml

C
Checo Lee
7/3/2023 5:45:00 PM

very useful to practice

D
dixitdnoh@gmail.com
8/27/2023 2:58:00 PM

this website is very helpful.

S
Sanjay
8/14/2023 8:07:00 AM

good content

B
Blessious Phiri
8/12/2023 2:19:00 PM

so challenging

P
PAYAL
10/17/2023 7:14:00 AM

17 should be d ,for morequery its scale out

K
Karthik
10/12/2023 10:51:00 AM

nice question

G
Godmode
5/7/2023 10:52:00 AM

yes.

B
Bhuddhiman
7/30/2023 1:18:00 AM

good mateial

K
KJ
11/17/2023 3:50:00 PM

good practice exam

S
sowm
10/29/2023 2:44:00 PM

impressivre qustion

C
CW
7/6/2023 7:06:00 PM

questions seem helpful

L
luke
9/26/2023 10:52:00 AM

good content

Z
zazza
6/16/2023 9:08:00 AM

question 21 answer is alerts

A
Abwoch Peter
7/4/2023 3:08:00 AM

am preparing for exam

M
mohamed
9/12/2023 5:26:00 AM

good one thanks

M
Mfc
10/23/2023 3:35:00 PM

only got thru 5 questions, need more to evaluate

W
Whizzle
7/24/2023 6:19:00 AM

q26 should be b

S
sarra
1/17/2024 3:44:00 AM

the aaa triad in information security is authentication, accounting and authorisation so the answer should be d 1, 3 and 5.

D
DBS
5/14/2023 12:56:00 PM

need to attend this

D
Da_costa
8/1/2023 5:28:00 PM

these are free brain dumps i understand, how can one get free pdf

V
vikas
10/28/2023 6:57:00 AM

provide access

A
Abdullah
9/29/2023 2:06:00 AM

good morning

R
Raj
6/26/2023 3:12:00 PM

please upload the ncp-mci 6.5 dumps, really need to practice this one. thanks guys

M
Miguel
10/5/2023 12:21:00 PM

question 16: https://help.salesforce.com/s/articleview?id=sf.care_console_overview.htm&type=5

AI Tutor 👋 I’m here to help!