Which Amazon Web Offerings (IAM) services should be employed to satisfy these requirements?

A business requires a forensic logging solution for hundreds of Docker-based apps running on Amazon EC2. The solution must analyze logs in real time, provide message replay, and persist logs. Which Amazon Web Offerings (IAM) services should be employed to satisfy these requirements? (Select two.)A . Amazon AthenaB . Amazon...

April 9, 2024 No Comments READ MORE +

What should the security engineer recommend?

A company is building an application on IAM that will store sensitive Information. The company has a support team with access to the IT infrastructure, including databases. The company's security engineer must introduce measures to protect the sensitive data against any data breach while minimizing management overhead. The credentials must...

April 9, 2024 No Comments READ MORE +

Which solution will meet these requirements?

A company is running internal microservices on Amazon Elastic Container Service (Amazon ECS) with the Amazon EC2 launch type. The company is using Amazon Elastic Container Registry (Amazon ECR) private repositories. A security engineer needs to encrypt the private repositories by using AWS Key Management Service (AWS KMS). The security...

April 9, 2024 No Comments READ MORE +

What should the security engineer do next to meet these requirements?

A company needs to store multiple years of financial records. The company wants to use Amazon S3 to store copies of these documents. The company must implement a solution to prevent the documents from being edited, replaced, or deleted for 7 years after the documents are stored in Amazon S3....

April 8, 2024 No Comments READ MORE +

What is the MOST secure way to meet these requirements?

Example.com is hosted on Amazon EC2 instances behind an Application Load Balancer (ALB). Third-party host intrusion detection system (HIDS) agents that capture the traffic of the EC2 instance are running on each host. The company must ensure they are using privacy enhancing technologies for users, without losing the assurance the...

April 8, 2024 No Comments READ MORE +

Which combination of steps should the application team take to deploy this architecture?

An application team wants to use IAM Certificate Manager (ACM) to request public certificates to ensure that data is secured in transit. The domains that are being used are not currently hosted on Amazon Route 53 The application team wants to use an IAM managed distribution and caching solution to...

April 8, 2024 No Comments READ MORE +

Which combination of steps should the security engineer take to gather this information?

A company h as a legacy application that runs on a single Amazon E C2 instance. A security audit shows that the application has been using an IAM access key within its code to access an Amazon S3 bucket that is named DOC-EXAMPLE-BUCKET1 in the same AWS account. This access...

April 8, 2024 No Comments READ MORE +

Which combination of steps will meet these requirements MOST cost-effectively?

A company's security engineer is developing an incident response plan to detect suspicious activity in an AWS account for VPC hosted resources. The security engineer needs to provide visibility for as many AWS Regions as possible. Which combination of steps will meet these requirements MOST cost-effectively? (Select TWO.)A . Turn...

April 8, 2024 No Comments READ MORE +

What is the FASTEST way for the security engineer to identify the federated user?

A company uses an external identity provider to allow federation into different IAM accounts. A security engineer for the company needs to identify the federated user that terminated a production Amazon EC2 instance a week ago. What is the FASTEST way for the security engineer to identify the federated user?A...

April 8, 2024 No Comments READ MORE +

Which configuration steps should the security engineer take to accomplish this task?

A company needs to use HTTPS when connecting to its web applications to meet compliance requirements. These web applications run in Amazon VPC on Amazon EC2 instances behind an Application Load Balancer (ALB). A security engineer wants to ensure that the load balancer win only accept connections over port 443....

April 8, 2024 No Comments READ MORE +