Which combination of actions would provide the MOST secure solution?

A Developer is building a serverless application that uses Amazon API Gateway as the front end. The application will not be publicly accessible. Other legacy applications running on Amazon EC2 will make calls to the application A Security Engineer Has been asked to review the security controls for authentication and...

January 14, 2021 No Comments READ MORE +

How should the company mitigate this concern?

A company is setting up products to deploy in AWS Service Catalog. Management is concerned that when users launch products, elevated IAM privileges will be required to create resources. How should the company mitigate this concern?A . Add a template constraint to each product in the portfolio.B . Add a...

January 14, 2021 No Comments READ MORE +

What steps should the Security Engineer take to check for known vulnerabilities and limit the attack surface?

The Security Engineer is managing a traditional three-tier web application that is running on Amazon EC2 instances. The application has become the target of increasing numbers of malicious attacks from the Internet. What steps should the Security Engineer take to check for known vulnerabilities and limit the attack surface? (Choose...

January 14, 2021 No Comments READ MORE +

Which combination of steps should the security engineer take in the incident account to complete the sharing operation?

A company always needs its Amazon Elastic Block Store (Amazon EBS) volumes to be encrypted During a security incident. EBS snapshots of suspicious instances are shared to a forensics account for analysis A security engineer attempting to share a suspicious EBS snapshot to the forensics account receives the following error...

January 13, 2021 No Comments READ MORE +

Which solution would have the MOST scalability and LOWEST latency?

A security engineer is designing a solution that will provide end-to-end encryption between clients and Docker containers running In Amazon Elastic Container Service (Amazon ECS). This solution will also handle volatile traffic patterns. Which solution would have the MOST scalability and LOWEST latency?A . Configure a Network Load Balancer to...

January 13, 2021 No Comments READ MORE +

Which combination of steps should the security engineer take to resolve the issue?

Unapproved changes were previously made to a company's Amazon S3 bucket. A security engineer configured AWS Config to record configuration changes made to the company's S3 buckets. The engineer discovers there are S3 configuration changes being made, but no Amazon SNS notifications are being sent. The engineer has already checked...

January 13, 2021 No Comments READ MORE +

Which solution meets these criteria?

A security engineer must use AWS Key Management Service (AWS KMS) to design a key management solution for a set of Amazon Elastic Block Store (Amazon EBS) volumes that contain sensitive data. The solution needs to ensure that the key material automatically expires in 90 days. Which solution meets these...

January 13, 2021 No Comments READ MORE +

What will enable the security engineer to saw the change?

A security engineer is asked to update an AW3 CoudTrail log file prefix for an existing trail. When attempting to save the change in the CloudTrail console, the security engineer receives the following error message. "There is a problem with the bucket policy'' What will enable the security engineer to...

January 13, 2021 No Comments READ MORE +

How should this be accomplished?

A company has multiple AWS accounts that are part of AW5 Organizations. The company's Security team wants to ensure that even those Administrators with full access to the company's AWS accounts are unable to access the company's Amazon S3 buckets How should this be accomplished?A . UseSCPsB . Add a...

January 13, 2021 No Comments READ MORE +

What is the MOST likely cause?

A Security Engineer is setting up an AWS CloudTrail trail for all regions in an AWS account. For added security, the logs are stored using server-side encryption with AWS KMS-managed keys (SSE-KMS) and have log integrity validation enabled. While testing the solution, the Security Engineer discovers that the digest files...

January 13, 2021 No Comments READ MORE +