๐ŸŽ„

CertoMetrics - 9% OFF Special Discount Offer - Ends In:

0d 00h 00m 00s
Coupon code: SALE2026

Amazon AWS Certified Security - Specialty 2026 (SCS-C03)

Get full access to the updated question bank and pass on your first attempt.

Vendor

Amazon

Certification

Specialty Certifications

Content

107 Qs

Status

Verified

Updated

18 minutes ago

Test the Practice Engine

Experience our real exam environment with free demo questions

Launch Free Demo
Best Value Bundle

Premium Bundle

Complete Success Suite

$128 $79

Save $49 Instantly

  • โœ“
    Full PDF + Interactive Engine Everything you need to pass
  • โœ“
    All Advanced Question Types Drag & Drop, Hotspots, Case Studies
  • โœ“
    Priority 24/7 Expert Support Direct line to certification leads
  • โœ“
    90 Days Free Priority Updates Stay current as exams change

Success Metric

98.4% Pass Rate

Verified by 15k+ Students
Secure Checkout
Popular

Standard Simulation

Practice Engine

$69

One-Time Payment

  • Web-Based (Zero Install)
  • Real Testing Environment Virtual & Practice Modes
  • Interactive Engine Drag & Drop, Hotspots
  • 60 Days Free Updates

Compatible with All Devices

Chrome
Verified Secure Checkout

Basic Tier

PDF Study Guide

$59

Digital Access

  • โœ“ Exam Questions (PDF)
  • โœ“ Mobile Friendly
  • โœ“ 60 Days Updates
Download Free Sample PDF

Verified 10-Question Preview

Secure Checkout

Verified Community

The CertoMetrics Standard.

Recommend the #1 platform for verified Amazon certification resources.

Success Network

Help a Colleague Succeed.

Invite a peer to get their own updated SCS-C03 prep kit.

Exam Overview

The AWS Certified Security - Specialty certification validates a candidate's advanced technical skills and experience in securing the AWS platform. Achieving the SCS-C03 demonstrates expertise in designing and implementing robust security solutions, effectively managing security incidents, and adhering to compliance requirements within the AWS cloud. This credential is vital for professionals aiming to solidify their role as a trusted security expert, enabling organizations to protect critical data and applications from evolving threats. It signifies a deep understanding of AWS security services, best practices, and the shared responsibility model, opening doors to high-demand roles and elevating one's career trajectory in the rapidly expanding cloud security domain. This certification positions you as a leader in cloud security.

Questions

65

Passing Score

750/1000

Duration

170 Minutes

Difficulty

Expert

Level

Specialist

Skills Measured

Incident Response and Security Operations
Logging, Monitoring, and Threat Detection
Infrastructure Security and Vulnerability Management
Identity and Access Management (IAM)
Data Protection and Encryption

Career Path

Target Roles

Cloud Security Engineer Security Architect DevSecOps Engineer

Common Questions

Is the material up to date?

Yes. We update our question bank weekly to match the latest Amazon standards. You get free updates for 90 days.

What format do I get?

You get instant access to both the **PDF** (for reading) and our **Premium Test Engine** (for exam simulation).

Is there a guarantee?

Absolutely. If you fail the SCS-C03 exam using our materials, we offer a full money-back guarantee.

When do I get the download?

Instantly. The download link is available in your dashboard immediately after payment is confirmed.

Free Study Guide Samples

Previewing updated SCS-C03 bank (22 Questions).

QUESTION 1

A company runs a global ecommerce website that is hosted on AWS. The company uses Amazon CloudFront to serve content to its user base. The company wants to block inbound traffic from a specific set of countries to comply with recent data regulation policies.

Which solution will meet these requirements MOST cost-effectively?

A
Create an AWS WAF web ACL with an IP match condition to deny the countries' IP ranges. Associate the web ACL with the CloudFront distribution.
B
Create an AWS WAF web ACL with a geo match condition to deny the specific countries. Associate the web ACL with the CloudFront distribution.
C
Use the geo restriction feature in CloudFront to deny the specific countries.
D
Use geolocation headers in CloudFront to deny the specific countries.

Correct Option: C

โœ… Option C (Correct) Reasoning: CloudFront's geo-restriction feature is specifically designed to block or allow traffic from specified countries directly at the CloudFront edge. It is a native, highly cost-effective solution for this requirement as it leverages the existing CloudFront service without needing additional services like WAF or custom origin logic, thus minimizing cost.

โŒ Why the other choices are incorrect:

  • Option A is incorrect: Managing IP ranges for entire countries is operationally complex, prone to errors, requires constant updates, and incurs AWS WAF costs, making it neither simple nor cost-effective.
  • Option B is incorrect: While AWS WAF with geo match is effective, it introduces additional costs for WAF web ACLs, rules, and requests processed, making it less cost-effective than CloudFront's native geo-restriction for this specific task.
  • Option D is incorrect: Using geolocation headers requires custom logic at the origin (e.g., Lambda@Edge or application code) to process and deny requests, adding complexity and potentially incurring additional compute costs, which is not the most cost-effective approach.


QUESTION 2

A security engineer needs to control access to data that is encrypted with an AWS Key Management Service (AWS KMS) customer managed key. The security engineer also needs to use additional authenticated data (AAD) to prevent tampering with ciphertext.

Which solution will meet these requirements?

A
Pass the key alias to AWS KMS when calling the Encrypt and Decrypt API actions.
B
Use IAM policies to restrict access to the Encrypt and Decrypt API actions.
C
Use the kms:EncryptionContext condition key when defining IAM policies for the customer managed key.
D
Use key policies to restrict access to the appropriate IAM groups.

Correct Option: C

โœ…

Reasoning: The kms:EncryptionContext condition key in IAM policies enforces that specific authenticated data (AAD) must be provided during Encrypt and Decrypt operations. This simultaneously controls access based on context and prevents tampering, as decryption fails if the context does not match. โŒ Why the other choices are incorrect:

  • Option A is incorrect: Passing a key alias identifies the key but does not enforce Additional Authenticated Data (AAD) or control access based on specific EncryptionContext values to prevent tampering.
  • Option B is incorrect: While IAM policies restrict Encrypt and Decrypt actions, this option is too general. It doesn't specify how to enforce AAD (EncryptionContext) to prevent tampering.
  • Option D is incorrect: Key policies control which IAM principals can use a key. While essential for access control, they don't inherently enforce EncryptionContext as AAD to prevent tampering at the data context level without explicit kms:EncryptionContext conditions.


QUESTION 3

A company runs container-based workloads outside of AWS. The company wants the workloads to obtain temporary security credentials to securely access the companyโ€™s AWS account The company currently uses AWS IAM Identity Centre to manage user access to the company's AWS resources.

Which solution will meet this requirement?

A
Use AWS Identity and Access Management (IAM) Roles Anywhere to create a trust anchor. Configure an IAM role to trust the IAM Roles Anywhere service principal
B
Use AWS Identity and Access Management (IAM) federation and create a trust anchor Configure an IAM role to trust the IAM service principal.
C
Set up an AWS managed application in AWS IAM Identity Center for the workload. Assign the AWS managed application to a group of users.
D
Set up a customer managed application in AWS IAM Identity Center for the workload. Assign the customer managed application to a group of users.

Correct Option: A

โœ… Option A (Correct) Reasoning: AWS IAM Roles Anywhere enables workloads running outside of AWS to obtain temporary security credentials to access AWS resources. It achieves this by trusting digital certificates issued by a private CA as a trust anchor, and configuring an IAM role to trust the rolesanywhere.amazonaws.com service principal.

โŒ Why the other choices are incorrect:

  • Option B is incorrect: While IAM federation exists, "IAM service principal" is not the correct trust entity for external workload federation without specifying OIDC or SAML, and Roles Anywhere is the explicit service for this use case.
  • Option C is incorrect: AWS IAM Identity Center manages user access. Setting up an application and assigning it to a group of users does not provide temporary credentials to a non-human workload.
  • Option D is incorrect: Similar to C, this option focuses on user access via IAM Identity Center for a customer-managed application, not on enabling a workload to obtain temporary credentials.


QUESTION 4

A consultant agency needs to perform a security audit for a company's production AWS account Several consultants need access to the account. The consultant agency already has its own AWS account

The company requires multi-factor authentication (MFA) for all access to its production account. The company also forbids the use of long-term credentials.

Which solution will provide the consultant agency with access that meets these requirements?

A
Create an IAM group. Create an IAM user for each consultant. Add each user to the group. Tum on MFA for each consultant.
B
Configure Amazon Cognito on the companys production account to authenticate against the consultant agency's identity provider (IdP). Add MFA to a Cognito user pool.
C
Create an IAM role in the consultant agencys AWS account. Define a trust policy that requires MFA In the trust policy, specify the company's production account as the principal. Attach the trust policy to the role.
D
Create an IAM role in the company's production account. Define a trust policy that requires MFA In the trust policy, specify the consultant agency's AWS account as the principal, Attach the trust policy to the role.

Correct Option: D

โœ… Option D (Correct) Reasoning: Creating an IAM role in the company's production account with a trust policy allowing the consultant agency's AWS account as principal, and enforcing MFA, provides temporary credentials. This approach eliminates long-term credentials for consultants in the production account and leverages their existing identities/MFA from their own account for secure cross-account access.

โŒ Why the other choices are incorrect:

  • Option A is incorrect: Creating IAM users in the company's production account for consultants introduces long-term credentials, violating the "forbids long-term credentials" requirement.
  • Option B is incorrect: Amazon Cognito is primarily for web/mobile application user authentication, not the standard, direct cross-account AWS Console/API access for another AWS account's users assuming roles.
  • Option C is incorrect: The IAM role should be created in the company's production account (the target account) for permissions, not in the consultant agency's account. The principal and role relationship is inverted.
QUESTION 5

A company has the following security policy for its Amazon Aurora MySQL databases for a single AWS account:

โ€ข Database storage must be encrypted at rest.

โ€ข Deletion protection must be enabled.

โ€ข Databases must not be publicly accessible.

โ€ข Database audit logs must be published to Amazon CloudWatch Logs.

A security engineer must implement a solution that continuously monitors all Aurora MySQL resources for continuous compliance with this policy. The solution must be able to display a database's compliance state for each part of the policy at any time.

Which solution will meet these requirements?

A
Enable AWS Audit Manager. Configure Audit Manager to use a custom framework that matches the security requirements. Create an assessment report to view the compliance state.
B
Enable AWS Config. Implement AWS Config managed rules that monitor all Aurora MySQL resources for the security requirements. View the compliance state in the AWS Config dashboard.
C
Enable AWS Security Hub. Create a configuration policy that includes the security requirements. Apply the configuration policy to all Aurora MySQL resources. View the compliance state in Security Hub.
D
Create an Amazon EventBridge rule that runs when an Aurora MySQL resource is created or modified. Create an AWS Lambda function to verify the security requirements and to send the compliance state to a CloudWatch custom metric.

Correct Option: B

โœ…

Reasoning: AWS Config continuously monitors resource configurations against desired policies using managed rules. It directly checks for encryption, deletion protection, public accessibility, and logging, then displays the compliance state of each Aurora MySQL resource in its dashboard. โŒ Why the other choices are incorrect:

  • Option A is incorrect: AWS Audit Manager collects evidence for audit reports, not for continuous, real-time operational compliance monitoring of individual resource configurations and states.
  • Option C is incorrect: AWS Security Hub aggregates security findings and monitors against security standards, often consuming findings from Config. It doesn't directly implement continuous configuration monitoring or allow defining granular configuration policies to apply and view compliance states like Config.
  • Option D is incorrect: While technically possible, this custom solution requires significant development and maintenance. AWS Config provides this functionality as a managed service with built-in rules, making it a more efficient and robust solution for continuous compliance.


QUESTION 6

A company creates AWS Lambda functions from container images that are stored in Amazon Elastic Container Registry (Amazon ECR). The company needs to identify any software vulnerabilities in the container images and any code vulnerabilities in the Lambda functions.

Which solution will meet these requirements?

A
Enable Amazon GuardDuty. Configure Amazon ECR scanning and Lambda code scanning in GuardDuty
B
Enable Amazon GuardDuty. Configure Runtime Monitoring and Lambda Protection in GuardDuty.
C
Enable Amazon Inspector. Configure Amazon ECR enhanced scanning and Lambda code scanning in Amazon Inspector.
D
Enable AWS Security Hub. Configure Runtime Monitoring and Lambda Protection in Security Hub.

Correct Option: C

โœ…

Reasoning: Amazon Inspector performs automated vulnerability management. Its ECR enhanced scanning identifies software vulnerabilities in container images. Its Lambda code scanning detects code vulnerabilities and configuration issues directly within Lambda functions, precisely meeting both requirements. โŒ Why the other choices are incorrect:

  • Option A is incorrect: GuardDuty is a threat detection service for malicious activity, not for scanning static software or code vulnerabilities in ECR or Lambda functions.
  • Option B is incorrect: GuardDuty's Runtime Monitoring and Lambda Protection detect runtime threats and suspicious behavior, not static software or code vulnerabilities as required.
  • Option D is incorrect: Security Hub aggregates findings; it doesn't perform direct vulnerability scanning. "Runtime Monitoring and Lambda Protection" are GuardDuty features, not Security Hub.


QUESTION 7

A company hosts its public website on Amazon EC2 instances behind an Application Load Balancer (ALB). The website is experiencing a global DDoS attack by a specific IoT device brand that has a unique user agent

A security engineer is creating an AWS WAF web ACL and will associate the web ACL with the ALB. The security engineer must implement a rule statement as part of the web ACL to block the requests. The rule statement must mitigate the current attack and future attacks from these IoT devices without blocking requests from customers.

Which rule statement will meet these requirements?

A
Use an IP set match rule statement that includes the IP address for IoT devices from the user agent.
B
Use a geographic match rule statement. Configure the statement to block countries that the IoT devices are located in.
C
Use a rate-based rule statement. Set a rate limit that is equal to the number of requests that are coming from the IoT devices.
D
Use a string match rule statement that includes details of the IoT device brand from the user agent.

Correct Option: D

โœ… Option D (Correct) Reasoning: The scenario specifies a "unique user agent" from a "specific IoT device brand." A string match rule, targeting the User-Agent header for that specific brand's identifier, precisely blocks the attacking devices without affecting legitimate users.

โŒ Why the other choices are incorrect:

  • Option A is incorrect: IoT device IP addresses can be dynamic, numerous, or shared, making IP set management impractical and prone to blocking legitimate traffic globally.
  • Option B is incorrect: Blocking entire countries for a global attack would severely impact legitimate customers worldwide, as the attack origin is global.
  • Option C is incorrect: A rate-based rule alone doesn't differentiate between malicious IoT traffic and legitimate high-volume requests, potentially blocking customers or failing to stop the specific attack.


QUESTION 8

A company has a PHP-based web application that uses Amazon S3 as an object store for user files. The S3 bucket that stores the files is configured for server-side encryption with Amazon S3 managed encryption keys (SSE-S3).

According to new security requirements, the company must control all encryption keys. Additionally, all objects in the S3 bucket must be encrypted by a key that the company controls.

Which combination of steps must a security engineer take to meet these requirements? (Select THREE.)

A
Create a new customer managed key in AWS Key Management Service (AWS KMS).
B
Change the SSE-S3 configuration on the S3 bucket to server-side encryption with customer-provided encryption keys (SSE-
C
Configure the PHP SDK to use the SSE-S3 key to encrypt the data before the data is uploaded to Amazon S3.
D
Create an AWS managed key for Amazon S3 in AWS Key Management Service (AWS KMS).
E
Change the SSE-S3 configuration on the S3 bucket to server-side encryption with AWS KMS managed encryption keys (SSE-KMS).
F
Change all the S3 objects in the bucket to use the new encryption key.

Correct Option: A,E,F

โœ… **Create a new customer managed key in AWS Key Management Service (AWS KMS) **

Reasoning: To meet the requirement of controlling encryption keys, the company must create a Customer Managed Key (CMK) in AWS KMS. SSE-S3 uses AWS-managed keys, not customer-controlled keys. A CMK provides explicit control over key policies and usage.


โœ… **Change the SSE-S3 configuration on the S3 bucket to server-side encryption with AWS KMS managed encryption keys (SSE-KMS) **

Reasoning: Configuring the S3 bucket for SSE-KMS allows it to use an AWS KMS key for server-side encryption. When combined with a CMK , this satisfies the requirement for the company to control the encryption key used for new objects.


โœ… **Change all the S3 objects in the bucket to use the new encryption key **

Reasoning: Setting default bucket encryption only applies to new uploads. Existing objects, currently encrypted with SSE-S3, must be re-encrypted with the new CMK (via SSE-KMS) to ensure all objects in the bucket meet the new encryption requirements. โŒ Why the other choices are incorrect:

  • Option B is incorrect: SSE-C requires the application to provide and manage the encryption key with each request, offering less centralized control and auditability compared to KMS, and does not integrate with S3 default encryption.
  • Option C is incorrect: SSE-S3 is server-side encryption using AWS-managed keys. The idea of configuring a PHP SDK to use an "SSE-S3 key" for client-side encryption is contradictory and incorrect.
  • Option D is incorrect: An AWS managed key for S3 in KMS (e.g., aws/s3) is managed by AWS, not controlled by the company, failing the primary requirement.
QUESTION 9

A company is operating an open-source software platform that is internet facing. The legacy software platform no longer receives security updates. The software platform operates using Amazon Route S3 weighted load balancing to send traffic to Amazon EC2 instances that connect to an Amazon RDS cluster. A recent report suggests this software platform is vulnerable to SQL injection attacks, with samples of attacks provided. The company's security engineer must secure this system against SQL injection attacks within 24 hours. The security engineer's solution must involve the least amount of effort and maintain normal operations during implementation.

What should the security engineer do to meet these requirements?

A
Create an Application Load Balancer with the existing EC2 instances as a target group. Create an AWS WAF web ACL containing rules that protect the application from this attack, then apply it to the ALB. Test to ensure the vulnerability has been mitigated, then redirect the Route 53 records to point to the ALB. Update security groups on the EC2 instances to prevent direct access from the internet.
B
Create an Amazon CloudFront distribution specifying one EC2 instance as an origin. Create an AWS WAF web ACL containing rules that protect the application from this attack, then apply it to the distribution. Test to ensure the vulnerability has been mitigated, then redirect the Route 53 records to point to CloudFront.
C
Obtain the latest source code for the platform and make tho necessary updates. Test tho updated code to ensure that the vulnerability has been mitigated, then deploy the patched version of tho platform to the EC2 instances.
D
Update the security group that is attached to the EC2 instances, removing access from the internet to the TCP port used by the SQL database. Create an AWS WAF web ACL containing rules that protect the application from this attack, then apply it to the EC2 instances. Test to ensure the vulnerability has been mitigated, then restore the security group to the original setting.

Correct Option: A

โœ… Option A (Correct) Reasoning: Creating an ALB with existing EC2s as targets, applying an AWS WAF web ACL with SQL injection rules, then redirecting Route 53, is the most effective and least effort solution. It leverages a managed service to mitigate the vulnerability externally, preventing code changes, maintaining operations via controlled cutover, and strengthening security by restricting EC2 direct access.

โŒ Why the other choices are incorrect:

  • Option B is incorrect: Specifying only one EC2 instance as a CloudFront origin would remove existing load balancing and reduce availability, not maintaining normal operations.
  • Option C is incorrect: This involves significant code changes for a legacy platform that no longer receives updates, making it high effort and unlikely within 24 hours.
  • Option D is incorrect: AWS WAF cannot be directly applied to EC2 instances. SQL injection occurs through the application, not direct internet access to the database port.
QUESTION 10

A company's web application is hosted on Amazon EC2 instances running behind an Application Load Balancer (ALB) in an Auto Scaling group. An AWS WAF web ACL is associated with the ALB. AWS CloudTrail is enabled, and stores logs in Amazon S3 and Amazon CloudWatch Logs.

The operations team has observed some EC2 instances reboot at random. After rebooting, all access logs on the instances have been deleted. During an investigation, the operations team found that each reboot happened just after a PHP error occurred on the new-user-creation.php file. The operations team needs to view log information to determine if the company is being attacked.

Which set of actions will identify the suspect attacker's IP address for future occurrences?

A
Configure VPC Flow Logs on the subnet where the ALB is located, and stream the data CloudWatch. Search for the new-user-creation.php occurrences in CloudWatch.
B
Configure the CloudWatch agent on the ALB. Configure the agent to send application logs to CloudWatch. Update the instance role to allow CloudWatch Logs access. Export the logs to CloudWatch. Search for the new-user-creation.php occurrences in CloudWatch.
C
Configure the ALB to export access logs to an Amazon OpenSearch Service cluster, and use the service to search for the new-user-creation.php occurrences.
D
Configure the web ACL to send Bgs to Amazon Data Firehose, which delivers the logs to an S3 bucket. Use Amazon Athena to query the logs and find the new-user-creation.php occurrences.

Correct Option: D

โœ… Option D (Correct) Reasoning: WAF logs contain the client IP address and the full request URI, which is essential to identify new-user-creation.php access. Sending logs to S3 via Firehose and querying with Athena provides a durable, scalable, and cost-effective solution for security analysis, directly addressing the need for attacker IP identification.

โŒ Why the other choices are incorrect:

  • Option A is incorrect: VPC Flow Logs record network flow metadata (IP, port, protocol) but do not capture application-layer details like HTTP URI paths (new-user-creation.php). Thus, they cannot identify the specific file access.
  • Option B is incorrect: The Application Load Balancer (ALB) does not support installing a CloudWatch agent to send application logs. ALB access logs are configured differently, typically sent directly to S3 or CloudWatch Logs.
  • Option C is incorrect: While ALB access logs contain client IP and URI, WAF logs are superior for security investigations. WAF logs provide additional security context such as WAF rule actions, offering more specific insights into potential attacks detected by the WAF already in place.
QUESTION 11

A company's application team needs a new AWS Key Management Service (AWS KMS) customer managed key to use with Amazon S3. The company's security policy requires separate keys for different AWS services to limit security exposure.

How can a security engineer limit the KMS customer managed key to work with only Amazon S3?

A
Configure the key policy to allow only Amazon S3 to perform the kms:Encrypt action.
B
Configure the key policy to allow KMS actions only when the value for the kms:ViaService condition key matches the Amazon S3 service name.
C
Configure the application's IAM role policy to allow Amazon S3 to perform the iam:PassRole action.
D
Configure the application's IAM role policy to allow only S3 operations when the operations are combined with the KMS customer managed key.

Premium Solution Locked

Unlock all 107 answers & explanations

QUESTION 12

A company has an AWS account that hosts a production application. The company receives an email notification that Amazon GuardDuty has detected an Impact: Lam User Anomalous behavior finding in the account A security engineer needs to run the investigation playbook for this security incident and must collect and analyze the information without affecting the application.

Which solution will meet these requirements MOST quickly?

A
Log in to the AWS account by using read-only credentials. Review the GuardDuty finding for details about the IAM credentials that were used. Use the IAM console to add a DenyAll policy to the IAM principal.
B
Log in to the AWS account by using read-only credentials. Review the GuardDuty finding to determine which API calls initiated the finding. Use Amazon Detective to review the API calls in context.
C
Log in to the AWS account by using administrator credentials. Review the GuardDuty finding for details about the IAM credentials that wore used. Use the IAM console to add a policy to the IAM principal.
D
Log in to the AWS account by using read-only credentials. Review the GuardDuty finding to determine which API calls initiated the finding. use AWS CloudTrail Insights and AWS CloudTrail Lake to review the API calls in context.

Premium Solution Locked

Unlock all 107 answers & explanations

QUESTION 13

A company in France uses Amazon Cognito with the Cognito Hosted IJI as an identity broker for sign-in and sign-up processes. The company is marketing an application and expects that all the application's users will come from France.

When the company launches the application, the company's security team observes fraudulent sign-ups for the application. Most of the fraudulent registrations are from users outside of France.

The security team needs a solution to perform custom validation at sign-up. Based on the results of the validation, the solution must accept or deny the registration request.

Which combination of steps will meet these requirements? (Select TWO.)

A
Create a pre sign-up AWS Lambda trigger. Associate the Amazon Cognito function with the Amazon Cognito user pool.
B
Use a geographic match rule statement to configure an AWS WAF web ACL. Associate the web ACL with the Amazon Cognito user pool.
C
Configure an app client for the application's Amazon Cognito user pool. Use the app client ID to validate the requests in the hosted Ul.
D
Update the application's Amazon Cognito user pool to configure a geographic restriction setting.
E
Use Amazon Cognito to configure a social identity provider (IdP) to validate the requests on the hosted.

Premium Solution Locked

Unlock all 107 answers & explanations

QUESTION 14

A company wants to establish separate AWS Key Management Servrice (AWS KMS) keys to use for different AWS services. The companys security engineer created the following key policy to allow the infrastructure deployment team to create encrypted Amazon Elastic Block Store (Amazon EBS) volumes by assuming the InfrastructureDeployment IAM role:

The security engineer recently discovered that IAM roles other than the InfrastructureDeployment role used this key for other services.

Which change to the policy should the security engineer make to resolve these issues?

A
In the statement block that contains the Sid "Allow use of the key", under the "Condition- block, change StringEquals to StringLike.
B
In the policy document, remove the statement block that contains the Sid โ€ขEnable IAM User Permissions". Add key management policies to the KMS policy.
C
In the statement block that contains tho Sid "Allow use of the key", under the "Condition" block, change the kms:VjaService value to ec2,us-east-1 -amazonaws.com.
D
In the policy document, add a new statement block that grants the kms:Disablet permission to the security engineer's IAM role.

Premium Solution Locked

Unlock all 107 answers & explanations

QUESTION 15

A company uses AWS Organizations with all features enabled. The company has enabled AWS Security Hub in all member accounts and in all AWS Regions. The company has created a VPC in the eu-central-l Region in a member AWS account.

A security engineer has verified that no security group rules in the VPC allow inbound traffic from all IP addresses on TCP port 22. The security engineer needs an automated system. The system must prevent the creation of security group rules in the VPC that allow traffic from all IP addresses on TCP port 22.

Which solution will meet these requirements?

A
Enable an AWS CloudTrail organization trail that logs to an Amazon CloudWatch Logs log group. Create a CloudWatch alarm based on a log group metric filter. Configure the alarm to publish to an Amazon Simple Notification Service (Amazon SNS) topic when a security group rule is added that allows inbound traffic from all IP addresses. Subscribe the security engineer's email address to the SNS topic.
B
Create an Amazon EventBridge rule that filters for Security Hub findings about security group rules that allow inbound traffic from all IP addresses on TCP port 22. Configure the EventBridge rule to target an AWS Lambda function that removes the unwanted security group rule.
C
Create an SCP that prevents the creation or modification of security group rules that allow inbound traffic from all IP addresses on TCP port 22.
D
Deploy AWS Network Firewall with a rule that inspects all inbound traffic and prevents incoming traffic on TCP port 22.

Premium Solution Locked

Unlock all 107 answers & explanations

QUESTION 16

A company has a large fleet of Amazon Linux 2 Amazon EC2 instances that run an application. The application processes sensitive data and has the following compliance requirements:

โ€ข No remote access management ports to tho EC2 instances can be exposod internally or extomally.

โ€ข All remote session activity must be recorded in an audit loge

โ€ข All remote access to the EC2 instances must be authenticated and authorized by AWS IAM Identity Center

The companfs DevOps team occasionally needs to connect to one of the EC2 instances to troubleshoot issues.

Which solution will provide remote access to the EC2 instances while meeting the compliance requirements?

A
Grant access to the EC2 serial console at the account level. Create an IAM policy that allows an IAM role of the DevOps team to access the EC2 serial console.
B
Enable EC2 Instance Connect on the AMI of the EC2 instances. Configure the appropriate secunty group rules. Grant EC2 console access to the DevOps team for access to EC2 Instance Connect.
C
Assign an EC2 instance role that allows access to AWS Systems Manager Create an IAM policy that grants access to Systems Manager Session Manager. Assign the policy to an IAM role of the DevOps team.
D
Use AWS Systems Manager Automation runbooks to open remote access ports to the EC2 instances. Attach a role to the EC2 instances to allow the runbooks to run.

Premium Solution Locked

Unlock all 107 answers & explanations

QUESTION 17

A healthcare company stores more than 1 million patient records in an Amazon S3 bucket. The patient records include personally identifiable information (PII). The S3 bucket contains hundreds of terabytes of data.

A security engineer receives an alert that was triggered by an Amazon GuardDuty Exfiltration:S3/AnomalousBehavior finding. The security engineer confirms that an attacker is using temporary credentials that were obtained from a compromised Amazon EC2 instance that has s3:GetObject permissions for the S3 bucket. The attacker has begun downloading the contents of the bucket. The security engineer contacts a development team. The development team will require 4 hours to implement and deploy a fix.

The security engineer must take immediate action to prevent the attacker from downloading more data from the S3 bucket.

Which solution will meet this requirement?

A
Revoke the temporary session that is associated with the instance profile that is attached to the EC2 instance.
B
Quarantine the EC2 instance by replacing the existing security group with a new security group that has no rules applied.
C
Enable Amazon Macie on the S3 bucket. Configure the managed data identifiers for personally identifiable information (PII). Enable S3 Object Lock on objects that Macie flags.
D
Apply an S3 bucket policy temporarily. Configure the policy to deny read access for all principals to block downloads while the development team address the vulnerability.

Premium Solution Locked

Unlock all 107 answers & explanations

QUESTION 18

A security engineer receives a notice about suspicious activity from a Linux-based Amazon EC2 instance that uses Amazon Elastic Block Store (Amazon EBS)-based storage. The instance is making connections to known malicious addresses.

The instance is in a development account within a VPC that is in the us-east-I Region. The VPC contains an internet gateway and has a subnet in us-east-la and us-east-lb. Each subnet is associated with a route table that uses the internet gateway as a default route. Each subnet also uses the default network ACL. The suspicious EC2 instance runs within the us-east-lb subnet During an initial investigation, a security engineer discovers that the suspicious instance is the only instance that runs in the subnet.

Which response will immediately mitigate the attack and help investigate the root cause?

A
Log in to the suspicious instance and use the netstat command to identify remote connections. Use the IP addresses from these remote connections to create deny rules in the security group of the instance. Install diagnostic tools on the instance for investigation. Update the outbound network ACL for the subnet in us-east-lb to explicitly deny all connections as the first rule during the investigation of the instance.
B
Update the outbound network ACL for the subnet in us-east-lb to explicitly deny all connections as the first rule. Replace the security group with a new security group that allows connections only from a diagnostics security group. Update the outbound network ACL for the us-east-lb subnet to remove the deny all rule. Launch a new EC2 instance that has diagnostic tools. Assign the new security group to the new EC2 instance. Use the new EC2 instance to investigate the suspicious instance.
C
Ensure that the Amazon Elastic Block Store (Amazon EBS) volumes that are attached to the suspicious EC2 instance will not delete upon termination. Terminate the instance. Launch a new EC2 instance in us-east-la that has diagnostic tools. Mount the EBS volumes from the terminated instance for investigation.
D
Create an AWS WAF web ACL that denies traffic to and from the suspicious instance. Attach the AWS WAF web ACL to the instance to mitigate the attack. Log in to the instance and install diagnostic tools to investigate the instance.

Premium Solution Locked

Unlock all 107 answers & explanations

QUESTION 19

A company has an encrypted Amazon Aurora DB cluster in the us-east-I Region. The DB cluster is encrypted with an AWS Key Management Service (AWS KMS) customer managed key. To meet compliance requirements, the company needs to copy a DB snapshot to the us-west-I Region. However, when the company tries to copy the

snapshot to us-west-I, the company cannot access the key that was used to encrypt the original database.

What should the company do to set up the snapshot in us-west-I with proper encryption?

A
Use AWS Secrets Manager to store the customer managed key in us-west-I as a secret. Use this secret to encrypt the snapshot in us-west-
I
Specify am:aws:rds:us-west-l:* as the principal.
B
Create a new customer managed key in us-west-
C
Create an IAM policy that allows access to the customer managed key in us-east-
D
Create an IAM policy that allows access to the customer managed key in us-east-

Premium Solution Locked

Unlock all 107 answers & explanations

QUESTION 20

A company stores sensitive data in an Amazon S3 bucket. The company encrypts the data at rest by using server-side encryption with Amazon S3 managed keys (SSE-S3). A security engineer must prevent any modifications to the data in the S3 bucket.

Which solution will meet this requirement?

A
Configure S3 bucket policies to deny DELETE and PIJT object permissions.
B
Configure S3 Object Lock in compliance mode with S3 bucket versioning enabled.
C
Change the encryption on the S3 bucket to use AWS Key Management Service (AWS KMS) customer managed keys.
D
Configure the S3 bucket with multi-factor authentication (MFA) delete protection.

Premium Solution Locked

Unlock all 107 answers & explanations

QUESTION 21

A company runs container-based workloads outside of AWS. The company wants the workloads to obtain temporary security credentials to securely access the company's AWS account. The company currently uses AWS IAM Identity Center to manage user access to the company's AWS resources.

Which solution will meet this requirement?

A
Use AWS Identity and Access Management (IAM) Roles Anywhere to create a trust anchor. Configure an IAM role to trust the IAM Roles Anywhere service principal.
B
Use AWS Identity and Access Management (IAM) federation and create a trust anchor. Configure an IAM role to trust the IAM service principal.
C
Set up an AWS managed application in AWS IAM Identity Center for the workload. Assign the AWS managed application to a group of users.
D
Set up a customer managed application in AWS IAM Identity Center for the workload. Assign the customer managed application to a group of users.

Premium Solution Locked

Unlock all 107 answers & explanations

QUESTION 22

A security engineer is designing a solution that will provide end-to-end encryption between clients and Docker containers running in Amazon Elastic Container Service (Amazon ECS). This solution will also handle volatile traffic patterns.

Which solution would have the MOST scalability and LOWEST latency?

A
Configure a Network Load Balancer to terminate the TLS traffic and then re-encrypt the traffic to the containers.
B
Configure an Application Load Balancer to terminate the TLS traffic and then re-encrypt the traffic to the containers.
C
Configure a Network Load Balancer with a TCP listener to pass through TLS traffic to the containers.
D
Configure Amazon Route 53 to use multivalue answer routing to send traffic to the containers.

Premium Solution Locked

Unlock all 107 answers & explanations

Full Question Bank Locked

You have reached the end of the free study guide preview. Upgrade now to unlock all 107 questions and the full simulation engine.

Customer Reviews

5 / 5
(15,000+ verified)
5
100%
4
0%
3
0%
2
0%
1
0%

Global Community Feedback

DM

David M.

Verified Student

"The practice engine is incredible. It feels exactly like the real testing environment and helped me build so much confidence."

SJ

Sarah J.

Premium Member

"The PDF is very well organized and the explanations for the answers are actually helpful, not just random text."

MC

Michael C.

Verified Buyer

"I was skeptical, but the content is high quality and definitely worth the price. I passed on my first try!"

Need Assistance?

Our expert support team is available to assist you with any inquiries about our exam materials.

Contact Support
Average response: < 24 Hours

Get Exam Updates

Subscribe to receive instant notifications on new questions and exclusive flash sales.

* Join 5,000+ students getting weekly updates

Support Chat โ— Active Now

๐Ÿ‘‹ Hi! How can we help you pass your exam?

Enter email to start chatting