Which of the following meet these security requirements?

A Security Administrator is configuring an Amazon S3 bucket and must meet the following security requirements: - Encryption in transit - Encryption at rest - Logging of all object retrievals in AWS CloudTrail Which of the following meet these security requirements? (Choose three.)A . Specify “aws:SecureTransport”: “true”within a condition in...

December 29, 2020 No Comments READ MORE +

Which of the following approaches achieve this requirement?

A company requires that IP packet data be inspected for invalid or malicious content. Which of the following approaches achieve this requirement? (Choose two.)A . Configure a proxy solution on Amazon EC2 and route all outbound VPC traffic through it. Perform inspection within proxy software on the EC2 instance.B ....

December 28, 2020 No Comments READ MORE +

Which architecture should the Security Engineer use to meet these requirements?

The Security Engineer is managing a web application that processes highly sensitive personal information. The application runs on Amazon EC2. The application has strict compliance requirements, which instruct that all incoming traffic to the application is protected from common web exploits and that all outgoing traffic from the EC2 instances...

December 28, 2020 No Comments READ MORE +

What could have been done to detect and automatically remediate the incident?

During a recent internal investigation, it was discovered that all API logging was disabled in a production account, and the root user had created new API keys that appear to have been used several times. What could have been done to detect and automatically remediate the incident?A . Using Amazon...

December 28, 2020 No Comments READ MORE +

Which of the following meets these requirements?

A company will store sensitive documents in three Amazon S3 buckets based on a data classification scheme of “Sensitive,” “Confidential,” and “Restricted.” The security solution must meet all of the following requirements: Each object must be encrypted using a unique key. - Items that are stored in the “Restricted” bucket...

December 28, 2020 No Comments READ MORE +

Which solution is the SIMPLEST way to allow the authentication of users using their social media identities?

The Security Engineer for a mobile game has to implement a method to authenticate users so that they can save their progress. Because most of the users are part of the same OpenID-Connect compatible social media website, the Security Engineer would like to use that as the identity provider. Which...

December 27, 2020 No Comments READ MORE +

What additional items need to be added to the IAM user policy?

An IAM user with fill EC2 permissions could bot start an Amazon EC2 instance after it was stopped for a maintenance task. Upon starting the instance, the instance state would change to “Pending”, but after a few seconds, it would switch back to “Stopped”. An inspection revealed that the instance...

December 26, 2020 No Comments READ MORE +

What solution will allow the Security team to complete this request?

During a recent security audit, it was discovered that multiple teams in a large organization have placed restricted data in multiple Amazon S3 buckets, and the data may have been exposed. The auditor has requested that the organization identify all possible objects that contain personally identifiable information (PII) and then...

December 26, 2020 No Comments READ MORE +

Which of the following supports this requirement for AWS resources that are encrypted by AWS KMS?

An application has a requirement to be resilient across not only Availability Zones within the application’s primary region but also be available within another region altogether. Which of the following supports this requirement for AWS resources that are encrypted by AWS KMS?A . Copy the application’s AWS KMS CMK from...

December 25, 2020 No Comments READ MORE +

What is the MOST efficient way to meet these requirements?

A Software Engineer wrote a customized reporting service that will run on a fleet of Amazon EC2 instances. The company security policy states that application logs for the reporting service must be centrally collected. What is the MOST efficient way to meet these requirements?A . Write an AWS Lambda function...

December 25, 2020 No Comments READ MORE +