Reliable Amazon - SCS-C02 - Exam AWS Certified Security - Specialty Score
Reliable Amazon - SCS-C02 - Exam AWS Certified Security - Specialty Score
Blog Article
Tags: Exam SCS-C02 Score, SCS-C02 Test Cram, SCS-C02 Exam Duration, SCS-C02 Practice Exam Pdf, SCS-C02 PDF Question
P.S. Free & New SCS-C02 dumps are available on Google Drive shared by PassCollection: https://drive.google.com/open?id=1NzaXF2wstHVPP2qtAYwgQvWDtDzdPZ3b
We have always taken care to provide the best Amazon SCS-C02 exam dumps to our customers. That's why we offer many other benefits with our product. We provide a demo version of the real product to our customers to clear their doubts about the truthfulness and accuracy of AWS Certified Security - Specialty (SCS-C02) preparation material. You can try the product before you buy it.
Amazon SCS-C02 Exam Syllabus Topics:
Topic | Details |
---|---|
Topic 1 |
|
Topic 2 |
|
Topic 3 |
|
SCS-C02 Test Cram | SCS-C02 Exam Duration
Our experts have worked hard for several years to formulate SCS-C02 exam braindumps for all examiners. Our SCS-C02 study materials not only target but also cover all knowledge points. And our practice materials also have a statistical analysis function to help you find out the deficiency in the learning process of SCS-C02 practice materials, so that you can strengthen the training for weak links. In this way, you can more confident for your success since you have improved your ability.
Amazon AWS Certified Security - Specialty Sample Questions (Q356-Q361):
NEW QUESTION # 356
A team is using AWS Secrets Manager to store an application database password. Only a limited number of IAM principals within the account can have access to the secret. The principals who require access to the secret change frequently. A security engineer must create a solution that maximizes flexibility and scalability.
Which solution will meet these requirements?
- A. Use a tag-based approach by attaching a resource policy to the secret. Apply tags to the secret and the IAM principals. Use the aws:PrincipalTag and aws:ResourceTag IAM condition keys to control access.
- B. Deploy a VPC endpoint for Secrets Manager. Create and attach an endpoint policy that specifies the IAM principals that are allowed to access the secret. Update the list of IAM principals as required.
- C. Use a role-based approach by creating an IAM role with an inline permissions policy that allows access to the secret. Update the IAM principals in the role trust policy as required.
- D. Use a deny-by-default approach by using IAM policies to deny access to the secret explicitly.Attach the policies to an IAM group. Add all IAM principals to the IAM group. Remove principals from the group when they need access. Add the principals to the group again when access is no longer allowed.
Answer: A
Explanation:
https://docs.aws.amazon.com/IAM/latest/UserGuide/introduction_attribute-based-access- control.html
https://aws.amazon.com/blogs/security/simplify-granting-access-to-your-aws-resources-by-using- tags-on-aws-iam-users-and-roles/
NEW QUESTION # 357
A company has a legacy application that runs on a single Amazon EC2 instance. A security audit shows that the application has been using an IAM access key within its code to access an Amazon S3 bucket that is named DOC-EXAMPLE-BUCKET1 in the same AWS account. This access key pair has the s3:GetObject permission to all objects in only this S3 bucket. The company takes the application offline because the application is not compliant with the company's security policies for accessing other AWS resources from Amazon EC2.
A security engineer validates that AWS CloudTrail is turned on in all AWS Regions. CloudTrail is sending logs to an S3 bucket that is named DOC-EXAMPLE-BUCKET2. This S3 bucket is in the same AWS account as DOC-EXAMPLE-BUCKET1. However, CloudTrail has not been configured to send logs to Amazon CloudWatch Logs.
The company wants to know if any objects in DOC-EXAMPLE-BUCKET1 were accessed with the IAM access key in the past 60 days. If any objects were accessed, the company wants to know if any of the objects that are text files (.txt extension) contained personally identifiable information (PII).
Which combination of steps should the security engineer take to gather this information? (Choose two.)
- A. Configure Amazon Macie to identify any objects in DOC-EXAMPLE-BUCKET1 that contain PII and that were available to the access key.
- B. Use Amazon Athena to query the CloudTrail logs in DOC-EXAMPLE-BUCKET2 for any API calls that used the access key to access an object that contained PII.
- C. Use Amazon CloudWatch Logs Insights to identify any objects in DOC-EXAMPLE-BUCKET1 that contain PII and that were available to the access key.
- D. Use Amazon OpenSearch Service (Amazon Elasticsearch Service) to query the CloudTrail logs in DOC-EXAMPLE-BUCKET2 for API calls that used the access key to access an object that contained PII.
- E. Use AWS Identity and Access Management Access Analyzer to identify any API calls that used the access key to access objects that contained PII in DOC-EXAMPLE-BUCKET1.
Answer: A,B
Explanation:
Use macie for sensitive data discovery.
Use Athena for API searches. Using Athena with CloudTrail logs is a powerful way to enhance your analysis of AWS service activity. For example, you can use queries to identify trends and further isolate activity by attributes, such as Access Keys.
A common application is to use CloudTrail logs to analyze operational activity for security and compliance.
NEW QUESTION # 358
A company is building an application on IAM that will store sensitive Information. The company has a support team with access to the IT infrastructure, including databases. The company's security engineer must introduce measures to protect the sensitive data against any data breach while minimizing management overhead. The credentials must be regularly rotated.
What should the security engineer recommend?
- A. Enable Amazon RDS encryption to encrypt the database and snapshots. Enable Amazon Elastic Block Store (Amazon EBS) encryption on Amazon EC2 instances. Store the database credentials in IAM Secrets Manager with automatic rotation. Set up TLS for the connection to the RDS hosted database.
- B. Install a database on an Amazon EC2 Instance. Enable third-party disk encryption to encrypt the Amazon Elastic Block Store (Amazon EBS) volume. Store the database credentials in IAM CloudHSM with automatic rotation. Set up TLS for the connection to the database.
- C. Set up an IAM CloudHSM cluster with IAM Key Management Service (IAM KMS) to store KMS keys.Set up Amazon RDS encryption using IAM KMS to encrypt the database. Store database credentials in the IAM Systems Manager Parameter Store with automatic rotation. Set up TLS for the connection to the RDS hosted database.
- D. Enable Amazon RDS encryption to encrypt the database and snapshots. Enable Amazon Elastic Block Store (Amazon EBS) encryption on Amazon EC2 instances. Include the database credential in the EC2 user data field. Use an IAM Lambda function to rotate database credentials. Set up TLS for the connection to the database.
Answer: A
NEW QUESTION # 359
A company's security engineer wants to receive an email alert whenever Amazon GuardDuty, AWS Identity and Access Management Access Analyzer, or Amazon Made generate a high-severity security finding. The company uses AWS Control Tower to govern all of its accounts. The company also uses AWS Security Hub with all of the AWS service integrations turned on.
Which solution will meet these requirements with the LEAST operational overhead?
- A. Host an application on Amazon EC2 to call the GuardDuty, 1AM Access Analyzer, and Macie APIs.Within the application, use the Amazon Simple Notification Service (Amazon SNS) API to retrieve high-severity findings and to send the findings to an SNS topic. Subscribe the desired email addresses to the SNS topic.
- B. Set up separate AWS Lambda functions for GuardDuty, 1AM Access Analyzer, and Macie to call each service's public API to retrieve high-severity findings. Use Amazon Simple Notification Service (Amazon SNS) to send the email alerts. Create an Amazon EventBridge rule to invoke the functions on a schedule.
- C. Create an Amazon EventBridge rule with a pattern that matches AWS Control Tower events with high severity. Configure the rule to send the findings to a target Amazon Simple Notification Service (Amazon SNS) topic. Subscribe the desired email addresses to the SNS topic.
- D. Create an Amazon EventBridge rule with a pattern that matches Security Hub findings events with high severity. Configure the rule to send the findings to a target Amazon Simple Notification Service (Amazon SNS) topic. Subscribe the desired email addresses to the SNS topic.
Answer: D
Explanation:
Explanation
The AWS documentation states that you can create an Amazon EventBridge rule with a pattern that matches Security Hub findings events with high severity. You can then configure the rule to send the findings to a target Amazon Simple Notification Service (Amazon SNS) topic. You can subscribe the desired email addresses to the SNS topic. This method is the least operational overhead way to meet the requirements.
References: : AWS Security Hub User Guide
NEW QUESTION # 360
A security team is working on a solution that will use Amazon EventBridge (Amazon CloudWatch Events) to monitor new Amazon S3 objects. The solution will monitor for public access and for changes to any S3 bucket policy or setting that result in public access. The security team configures EventBridge to watch for specific API calls that are logged from AWS CloudTrail. EventBridge has an action to send an email notification through Amazon Simple Notification Service (Amazon SNS) to the security team immediately with details of the API call.
Specifically, the security team wants EventBridge to watch for the s3:PutObjectAcl, s3:DeleteBucketPolicy, and s3:PutBucketPolicy API invocation logs from CloudTrail. While developing the solution in a single account, the security team discovers that the s3:PutObjectAcl API call does not invoke an EventBridge event.
However, the s3:DeleteBucketPolicy API call and the s3:PutBucketPolicy API call do invoke an event.
The security team has enabled CloudTrail for AWS management events with a basic configuration in the AWS Region in which EventBridge is being tested. Verification of the EventBridge event pattern indicates that the pattern is set up correctly. The security team must implement a solution so that the s3:PutObjectAcl API call will invoke an EventBridge event. The solution must not generate false notifications.
Which solution will meet these requirements?
- A. Enable CloudTrail Insights to identify unusual API activity.
- B. Modify the EventBridge event pattern by selecting Amazon S3. Select All Events as the event type.
- C. Modify the EventBridge event pattern by selecting Amazon S3. Select Bucket Level Operations as the event type.
- D. Enable CloudTrail to monitor data events for read and write operations to S3 buckets.
Answer: D
Explanation:
Explanation
The correct answer is D. Enable CloudTrail to monitor data events for read and write operations to S3 buckets.
According to the AWS documentation1, CloudTrail data events are the resource operations performed on or within a resource. These are also known as data plane operations. Data events are often high-volume activities.
For example, Amazon S3 object-level API activity (such as GetObject, DeleteObject, and PutObject) is a data event.
By default, trails do not log data events. To record CloudTrail data events, you must explicitly add the supported resources or resource types for which you want to collect activity. For more information, see Logging data events in the Amazon S3 User Guide2.
In this case, the security team wants EventBridge to watch for the s3:PutObjectAcl API invocation logs from CloudTrail. This API uses the acl subresource to set the access control list (ACL) permissions for a new or existing object in an S3 bucket3. This is a data event that affects the S3 object resource type. Therefore, the security team must enable CloudTrail to monitor data events for read and write operations to S3 buckets in order to invoke an EventBridge event for this API call.
The other options are incorrect because:
A: Modifying the EventBridge event pattern by selecting Amazon S3 and All Events as the event type will not capture the s3:PutObjectAcl API call, because this is a data event and not a management event.
Management events provide information about management operations that are performed on resources in your AWS account. These are also known as control plane operations4.
B: Modifying the EventBridge event pattern by selecting Amazon S3 and Bucket Level Operations as the event type will not capture the s3:PutObjectAcl API call, because this is a data event that affects the S3 object resource type and not the S3 bucket resource type. Bucket level operations are management events that affect the configuration or metadata of an S3 bucket5.
C: Enabling CloudTrail Insights to identify unusual API activity will not help the security team monitor new S3 objects or changes to any S3 bucket policy or setting that result in public access. CloudTrail Insights helps AWS users identify and respond to unusual activity associated with API calls and API error rates by continuously analyzing CloudTrail management events6. It does not analyze data events or generate EventBridge events.
References:
1: CloudTrail log event reference - AWS CloudTrail 2: Logging data events - AWS CloudTrail 3:
PutObjectAcl - Amazon Simple Storage Service 4: [Logging management events - AWS CloudTrail] 5:
[Amazon S3 Event Types - Amazon Simple Storage Service] 6: Logging Insights events for trails - AWS CloudTrail
NEW QUESTION # 361
......
It is convenient for the user to read. The SCS-C02 test materials have a biggest advantage that is different from some online learning platform which has using terminal number limitation, the SCS-C02 quiz torrent can meet the client to log in to learn more, at the same time, the user can be conducted on multiple computers online learning, greatly reducing the time, and people can use the machine online of SCS-C02 Test Prep more conveniently at the same time. As far as concerned, the online mode for mobile phone clients has the same function.
SCS-C02 Test Cram: https://www.passcollection.com/SCS-C02_real-exams.html
- Exam SCS-C02 Training ???? SCS-C02 New Dumps Ppt ???? SCS-C02 Standard Answers ???? Download ▶ SCS-C02 ◀ for free by simply entering [ www.examcollectionpass.com ] website ????Valid SCS-C02 Test Papers
- Top Exam SCS-C02 Score 100% Pass | Efficient SCS-C02: AWS Certified Security - Specialty 100% Pass ???? Immediately open ➥ www.pdfvce.com ???? and search for ⏩ SCS-C02 ⏪ to obtain a free download ????Guaranteed SCS-C02 Passing
- Advantages Of Amazon SCS-C02 Practice Test Software ???? Easily obtain ➽ SCS-C02 ???? for free download through ( www.prep4pass.com ) ????100% SCS-C02 Exam Coverage
- Amazon SCS-C02 Free Demo ???? Download ▛ SCS-C02 ▟ for free by simply entering [ www.pdfvce.com ] website ☯New SCS-C02 Mock Test
- Amazon SCS-C02 Free Demo ???? Simply search for ▷ SCS-C02 ◁ for free download on “ www.real4dumps.com ” ????SCS-C02 Latest Exam Camp
- Pdfvce Commitment to Your Amazon SCS-C02 Exam Success ???? Simply search for ➽ SCS-C02 ???? for free download on ➠ www.pdfvce.com ???? ????Actual SCS-C02 Tests
- SCS-C02 New Dumps Ppt ???? New SCS-C02 Mock Test ???? Reliable SCS-C02 Test Review ???? Search for ( SCS-C02 ) and download exam materials for free through { www.pass4leader.com } ????Valid SCS-C02 Test Preparation
- Pass Guaranteed Quiz Amazon - SCS-C02 - AWS Certified Security - Specialty –Efficient Exam Score ⬆ Copy URL ▶ www.pdfvce.com ◀ open and search for ⇛ SCS-C02 ⇚ to download for free ????New SCS-C02 Practice Questions
- Best Exam SCS-C02 Score Along with Real Questions ???? Search for { SCS-C02 } and download exam materials for free through { www.real4dumps.com } ????Actual SCS-C02 Tests
- New SCS-C02 Mock Test ???? Actual SCS-C02 Tests ???? Training SCS-C02 Kit ???? Search for ➤ SCS-C02 ⮘ and easily obtain a free download on ▛ www.pdfvce.com ▟ ????Actual SCS-C02 Tests
- Exam SCS-C02 Training ???? Latest SCS-C02 Dumps Free ???? SCS-C02 Standard Answers ???? Immediately open ➠ www.dumps4pdf.com ???? and search for ( SCS-C02 ) to obtain a free download ⏩Latest SCS-C02 Dumps Free
- SCS-C02 Exam Questions
- frankha914.blogdal.com hannahf521.ambien-blog.com bbs.i1234.vip 龍炎之戰.官網.com www.hzy9.com fujia.s108-164.myverydz.cn 泰納克.官網.com www.shiguc.com 龍炎之戰.官網.com dh.gojson.cn
DOWNLOAD the newest PassCollection SCS-C02 PDF dumps from Cloud Storage for free: https://drive.google.com/open?id=1NzaXF2wstHVPP2qtAYwgQvWDtDzdPZ3b
Report this page