Which of the following supports this requirement for AWS resources that are encrypted by AWS KMS?

An application has a requirement to be resilient across not only Availability Zones within the application’s primary region but also be available within another region altogether. Which of the following supports this requirement for AWS resources that are encrypted by AWS KMS?A . Copy the application’s AWS KMS CMK from...

December 23, 2019 No Comments READ MORE +

What additional items need to be added to the IAM user policy?

An IAM user with fill EC2 permissions could bot start an Amazon EC2 instance after it was stopped for a maintenance task. Upon starting the instance, the instance state would change to “Pending”, but after a few seconds, it would switch back to “Stopped”. An inspection revealed that the instance...

December 23, 2019 No Comments READ MORE +

Which solution would remediate the audit finding while minimizing the effort required?

An organization has a system in AWS that allows a large number of remote workers to submit data files. File sizes vary from a few kilobytes to several megabytes. A recent audit highlighted a concern that data files are not encrypted while in transit over untrusted networks. Which solution would...

December 22, 2019 No Comments READ MORE +

What mechanism will allow the company to implement all required network rules without incurring additional cost?

A company has complex connectivity rules governing ingress, egress, and communications between Amazon EC2 instances. The rules are so complex that they cannot be implemented within the limits of the maximum number of security groups and network access control lists (network ACLs). What mechanism will allow the company to implement...

December 21, 2019 No Comments READ MORE +

What is the function of the following AWS Key Management Service (KMS) key policy attached to a customer master key (CMK)?

What is the function of the following AWS Key Management Service (KMS) key policy attached to a customer master key (CMK)? A . The Amazon WorkMail and Amazon SES services have delegated KMS encrypt and decrypt permissions to the ExampleUser principal in the 111122223333 account.B . The ExampleUser principal can...

December 19, 2019 No Comments READ MORE +

What solution will allow the Security team to complete this request?

During a recent security audit, it was discovered that multiple teams in a large organization have placed restricted data in multiple Amazon S3 buckets, and the data may have been exposed. The auditor has requested that the organization identify all possible objects that contain personally identifiable information (PII) and then...

December 19, 2019 No Comments READ MORE +

Which architecture should the Security Engineer use to meet these requirements?

The Security Engineer is managing a web application that processes highly sensitive personal information. The application runs on Amazon EC2. The application has strict compliance requirements, which instruct that all incoming traffic to the application is protected from common web exploits and that all outgoing traffic from the EC2 instances...

December 18, 2019 No Comments READ MORE +

Which option for the use of the AWS Key Management Service (KMS) supports key management best practices that focus on minimizing the potential scope of data exposed by a possible future key compromise?

Which option for the use of the AWS Key Management Service (KMS) supports key management best practices that focus on minimizing the potential scope of data exposed by a possible future key compromise?A . Use KMS automatic key rotation to replace the master key, and use this new master key...

December 17, 2019 No Comments READ MORE +

What approach enables the Administrator to search through the logs MOST efficiently?

A Security Administrator is performing a log analysis as a result of a suspected AWS account compromise. The Administrator wants to analyze suspicious AWS CloudTrail log files but is overwhelmed by the volume of audit logs being generated. What approach enables the Administrator to search through the logs MOST efficiently?A...

December 17, 2019 No Comments READ MORE +

What is the MOST cost-effective way to manage the storage of credentials?

A water utility company uses a number of Amazon EC2 instances to manage updates to a fleet of 2,000 Internet of Things (IoT) field devices that monitor water quality. These devices each have unique access credentials. An operational safety policy requires that access to specific credentials is independently auditable. What...

December 16, 2019 No Comments READ MORE +