Which combination of steps will meet this requirement?

A company accidentally deleted the private key for an Amazon Elastic Block Store (Amazon EBS)-backed Amazon EC2 instance. A security engineer needs to regain access to the instance. Which combination of steps will meet this requirement? (Choose two.)A . Stop the instance. Detach the root volume. Generate a new key...

April 1, 2024 No Comments READ MORE +

How will the security engineer be able to comply with these requirements?

Within a VPC, a corporation runs an Amazon RDS Multi-AZ DB instance. The database instance is connected to the internet through a NAT gateway via two subnets. Additionally, the organization has application servers that are hosted on Amazon EC2 instances and use the RDS database. These EC2 instances have been...

April 1, 2024 No Comments READ MORE +

Which configuration caused this issue?

A System Administrator is unable to start an Amazon EC2 instance in the eu-west-1 Region using an IAM role The same System Administrator is able to start an EC2 instance in the eu-west-2 and eu-west-3 Regions. The IAMSystemAdministrator access policy attached to the System Administrator IAM role allows unconditional access...

April 1, 2024 No Comments READ MORE +

How should the security engineer correct the error?

A security engineer logs in to the AWS Lambda console with administrator permissions. The security engineer is trying to view logs in Amazon CloudWatch for a Lambda function that is named my Function. When the security engineer chooses the option in the Lambda console to view logs in CloudWatch, an...

March 31, 2024 No Comments READ MORE +

Which solution will meet these requirements with the LEAST operational overhead?

A company is designing a multi-account structure for its development teams. The company is using AWS Organizations and AWS Single Sign-On (AWS SSO). The company must implement a solution so that the development teams can use only specific AWS Regions and so that each AWS account allows access to only...

March 30, 2024 No Comments READ MORE +

What should the security engineer do next?

A company hosts an application on Amazon EC2 that is subject to specific rules for regulatory compliance. One rule states that traffic to and from the workload must be inspected for network-level attacks. This involves inspecting the whole packet. To comply with this regulatory rule, a security engineer must install...

March 30, 2024 No Comments READ MORE +

Which solution will meet this requirement?

A systems engineer deployed containers from several custom-built images that an application team provided through a QA workflow The systems engineer used Amazon Elastic Container Service (Amazon ECS) with the Fargate launch type as the target platform The system engineer now needs to collect logs from all containers into an...

March 30, 2024 No Comments READ MORE +

What should a security engineer do to meet this requirement for this customer managed key?

A company has an AWS Key Management Service (AWS KMS) customer managed key with imported key material Company policy requires all encryption keys to be rotated every year What should a security engineer do to meet this requirement for this customer managed key? A. Enable automatic key rotation annually for...

March 30, 2024 No Comments READ MORE +

Why should the Security Engineer choose IAM CloudHSM over IAM KMS for encryption key management in this situation?

A company is developing a highly resilient application to be hosted on multiple Amazon EC2 instances. The application will store highly sensitive user data in Amazon RDS tables The application must • Include migration to a different IAM Region in the application disaster recovery plan. • Provide a full audit...

March 30, 2024 No Comments READ MORE +

Which solution will meet this requirement?

A company is using Amazon Macie, AWS Firewall Manager, Amazon Inspector, and AWS Shield Advanced in its AWS account. The company wants to receive alerts if a DDoS attack occurs against the account. Which solution will meet this requirement?A . Use Macie to detect an active DDoS event. Create Amazon...

March 30, 2024 No Comments READ MORE +