Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

SCS-C03 AWS Certified Security – Specialty is now Stable and With Pass Result | Test Your Knowledge for Free

SCS-C03 Practice Questions

AWS Certified Security – Specialty

Last Update 7 hours ago
Total Questions : 179

Dive into our fully updated and stable SCS-C03 practice test platform, featuring all the latest AWS Certified Specialty exam questions added this week. Our preparation tool is more than just a Amazon Web Services study aid; it's a strategic advantage.

Our free AWS Certified Specialty practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about SCS-C03. Use this test to pinpoint which areas you need to focus your study on.

SCS-C03 PDF

SCS-C03 PDF (Printable)
$43.75
$124.99

SCS-C03 Testing Engine

SCS-C03 PDF (Printable)
$50.75
$144.99

SCS-C03 PDF + Testing Engine

SCS-C03 PDF (Printable)
$63.7
$181.99
Question # 1

A security engineer is designing security controls for a fleet of Amazon EC2 instances that run sensitive workloads in a VP

C.  

The security engineer needs to implement a solution to detect and mitigate software vulnerabilities on the EC2 instances.

Which solution will meet this requirement?

Options:

A.  

Scan the EC2 instances by using Amazon Inspector. Apply security patches and updates by using AWS Systems Manager Patch Manager.

B.  

Install host-based firewall and antivirus software on each EC2 instance. Use AWS Systems Manager Run Command to update the firewall and antivirus software.

C.  

Install the Amazon CloudWatch agent on the EC2 instances. Enable detailed logging. Use Amazon EventBridge to review the software logs for anomalies.

D.  

Scan the EC2 instances by using Amazon GuardDuty Malware Protection. Apply security patches and updates by using AWS Systems Manager Patch Manager.

Discussion 0
Question # 2

A healthcare company stores more than 1 million patient records in an Amazon S3 bucket. The patient records include personally identifiable information (PII). The S3 bucket contains hundreds of terabytes of data.

A security engineer receives an alert that was triggered by an Amazon GuardDuty Exfiltration:S3/AnomalousBehavior finding. The security engineer confirms that an attacker is using temporary credentials that were obtained from a compromised Amazon EC2 instance that has s3:GetObject permissions for the S3 bucket. The attacker has begun downloading the contents of the bucket. The security engineer contacts a development team. The development team will require 4 hours to implement and deploy a fix.

The security engineer must take immediate action to prevent the attacker from downloading more data from the S3 bucket.

Which solution will meet this requirement?

Options:

A.  

Revoke the temporary session that is associated with the instance profile that is attached to the EC2 instance.

B.  

Quarantine the EC2 instance by replacing the existing security group with a new security group that has no rules applied.

C.  

Enable Amazon Macie on the S3 bucket. Configure the managed data identifiers for personally identifiable information (PII). Enable S3 Object Lock on objects that Macie flags.

D.  

Apply an S3 bucket policy temporarily. Configure the policy to deny read access for all principals to block downloads while the development team address the vulnerability.

Discussion 0
Question # 3

A company has decided to move its fleet of Linux-based web server instances to an Amazon EC2 Auto Scaling group. Currently, the instances are static and are launched manually. When an administrator needs to view log files, the administrator uses SSH to establish a connection to the instances and retrieves the logs manually.

The company often needs to query the logs to produce results about application sessions and user issues. The company does not want its new automatically scaling architecture to result in the loss of any log files when instances are scaled in.

Which combination of steps should a security engineer take to meet these requirements MOST cost-effectively? (Select TWO.)

Options:

A.  

Configure a cron job on the instances to forward the log files to Amazon S3 periodically.

B.  

Configure AWS Glue and Amazon Athena to query the log files.

C.  

Configure the Amazon CloudWatch agent on the instances to forward the logs to Amazon CloudWatch Logs.

D.  

Configure Amazon CloudWatch Logs Insights to query the log files.

E.  

Configure the instances to write the logs to an Amazon Elastic File System (Amazon EFS) volume.

Discussion 0
Question # 4

A company is running a containerized application on an Amazon Elastic Container Service (Amazon ECS) cluster that uses AWS Fargate. The application runs as several ECS services. The ECS services are in individual target groups for an internet-facing Application Load Balancer (ALB). The ALB is the origin for an Amazon CloudFront distribution. An AWS WAF web ACL is associated with the CloudFront distribution.

Web clients access the ECS services through the CloudFront distribution. The company learns that the web clients can bypass the web ACL and can access the ALB directly.

Which solution will prevent the web clients from directly accessing the ALB?

Options:

A.  

Create an AWS PrivateLink endpoint. Specify the existing ALB as the target. Update the CloudFront distribution by setting the PrivateLink endpoint as the origin.

B.  

Create a new internal AL

B.  

Move all the ECS services to the internal AL

B.  

Delete the internet-facing AL

B.  

Update the CloudFront distribution by setting the internal ALB as the origin.

C.  

Modify the listener rules for the existing AL

B.  

Add a condition to forward only the requests that come from IP addresses in the CloudFront origin prefix list.

D.  

Update the CloudFront distribution by adding an X-Shared-Secret custom header for the origin. Modify the listener rules for the existing ALB to forward only the requests in which the X-Shared-Secret header has the correct value.

Discussion 0
Question # 5

A security engineer discovers that a company ' s user passwords have no required minimum length. The company is using the following two identity providers (IdPs):

• AWS Identity and Access Management (IAM) federated with on-premises Active Directory

• Amazon Cognito user pools that contain the user database for an AWS Cloud application that the company developed

Which combination of actions should the security engineer take to implement a required minimum length for the passwords? (Select TWO.)

Options:

A.  

Update the password length policy in the IAM configuration.

B.  

Update the password length policy in the Cognito configuration.

C.  

Update the password length policy in the on-premises Active Directory configuration.

D.  

Create an SCP in AWS Organizations. Configure the SCP to enforce a minimum password length for IAM and Cognito.

E.  

Create an IAM policy that includes a condition for minimum password length. Enforce the policy for IAM and Cognito.

Discussion 0
Question # 6

A company runs a web application on a fleet of Amazon EC2 instances that are in an Auto Scaling group. The EC2 instances are in the same VPC subnet as other workloads.

A security engineer deploys an Amazon GuardDuty detector in the same AWS Region as the EC2 instances and integrates GuardDuty with AWS Security Hub.

The security engineer needs to implement an automated solution to detect and appropriately respond to anomalous traffic patterns for the web application. The solution must comply with AWS best practices forinitial response to security incidentsand mustminimize disruptionto the web application.

Which solution will meet these requirements?

Options:

A.  

Disable the EC2 instance profile credentials by using AWS Lambda.

B.  

Create an Amazon EventBridge rule that invokes an AWS Lambda function when GuardDuty detects anomalous traffic. Configure the function to remove the affected instance from the Auto Scaling group and attach a restricted security group.

C.  

Update the subnet network ACL to block traffic from the detected source IP addresses.

D.  

Send GuardDuty findings to Amazon SNS for email notification.

Discussion 0
Question # 7

A security administrator is setting up a new AWS account. The security administrator wants to secure the data that a company stores in an Amazon S3 bucket. The security administrator also wants to reduce the chance of unintended data exposure and the potential for misconfiguration of objects that are in the S3 bucket.

Which solution will meet these requirements with the LEAST operational overhead?

Options:

A.  

Configure the S3 Block Public Access feature for the AWS account.

B.  

Configure the S3 Block Public Access feature for all objects that are in the bucket.

C.  

Deactivate ACLs for objects that are in the bucket.

D.  

Use AWS PrivateLink for Amazon S3 to access the bucket.

Discussion 0
Question # 8

A company stores sensitive data in an Amazon S3 bucket. The company encrypts the data at rest by using server-side encryption with Amazon S3 managed keys (SSE-S3). A security engineer must prevent any modifications to the data in the S3 bucket.

Which solution will meet this requirement?

Options:

A.  

Configure S3 bucket policies to deny DELETE and PUT object permissions.

B.  

Configure S3 Object Lock in compliance mode with S3 bucket versioning enabled.

C.  

Change the encryption on the S3 bucket to use AWS Key Management Service (AWS KMS) customer managed keys.

D.  

Configure the S3 bucket with multi-factor authentication (MFA) delete protection.

Discussion 0
Question # 9

A company runs its microservices architecture in Kubernetes containers on AWS by using Amazon Elastic Kubernetes Service (Amazon EKS) and Amazon Aurora. The company has an organization in AWS Organizations to manage hundreds of AWS accounts that host different microservices.

The company needs to implement a monitoring solution for logs from all AWS resources across all accounts. The solution must include automatic detection of security-related issues.

Which solution will meet these requirements with theLEAST operational effort?

Options:

A.  

Designate an Amazon GuardDuty administrator account in the organization’s management account. Enable GuardDuty for all accounts. Enable EKS Protection and RDS Protection in the GuardDuty administrator account.

B.  

Designate a monitoring account. Share Amazon CloudWatch Logs from all accounts. Use Amazon Inspector to evaluate the logs.

C.  

Centralize CloudTrail logs in Amazon S3 and analyze them with Amazon Athena.

D.  

Stream CloudWatch Logs to Amazon Kinesis and analyze them with custom AWS Lambda functions.

Discussion 0
Question # 10

A company needs to identify the root cause of security findings and investigate IAM roles involved in those findings. The company has enabled VPC Flow Logs, Amazon GuardDuty, and AWS CloudTrail.

Which solution will meet these requirements?

Options:

A.  

Use Amazon Detective to investigate IAM roles and visualize findings.

B.  

Use Amazon Inspector and CloudWatch dashboards.

C.  

Export GuardDuty findings to S3 and analyze with Athena.

D.  

Use Security Hub custom actions to investigate IAM roles.

Discussion 0
Get SCS-C03 dumps and pass your exam in 24 hours!

Free Exams Sample Questions