Which of the following solutions will meet these requirements?

Compliance requirements state that all communications between company on-premises hosts and EC2 instances be encrypted in transit. Hosts use custom proprietary protocols for their communication, and EC2 instances need to be fronted by a load balancer for increased availability. Which of the following solutions will meet these requirements?A . Offload...

August 22, 2019 No Comments READ MORE +

Which action should the Engineer take based on this situation?

A Security Engineer received an AWS Abuse Notice listing EC2 instance IDs that are reportedly abusing other hosts. Which action should the Engineer take based on this situation? (Choose three.)A . Use AWS Artifact to capture an exact image of the state of each instance.B . Create EBS Snapshots of...

August 22, 2019 No Comments READ MORE +

How can the Administrator restrict usage of member root user accounts across the organization?

A Security Administrator is restricting the capabilities of company root user accounts. The company uses AWS Organizations and has enabled it for all feature sets, including consolidated billing. The top-level account is used for billing and administrative purposes, not for operational AWS resource purposes. How can the Administrator restrict usage...

August 20, 2019 No Comments READ MORE +

Which of the following supports this requirement for AWS resources that are encrypted by AWS KMS?

An application has a requirement to be resilient across not only Availability Zones within the application’s primary region but also be available within another region altogether. Which of the following supports this requirement for AWS resources that are encrypted by AWS KMS?A . Copy the application’s AWS KMS CMK from...

August 20, 2019 No Comments READ MORE +

What could have been done to detect and automatically remediate the incident?

During a recent internal investigation, it was discovered that all API logging was disabled in a production account, and the root user had created new API keys that appear to have been used several times. What could have been done to detect and automatically remediate the incident?A . Using Amazon...

August 19, 2019 No Comments READ MORE +

Which of the following may be causing this problem?

A company has contracted with a third party to audit several AWS accounts. To enable the audit, cross-account IAM roles have been created in each account targeted for audit. The Auditor is having trouble accessing some of the accounts. Which of the following may be causing this problem? (Choose three.)A...

August 18, 2019 No Comments READ MORE +

Which of the following actions should the Engineer perform to get further guidance?

A Security Engineer is trying to determine whether the encryption keys used in an AWS service are in compliance with certain regulatory standards. Which of the following actions should the Engineer perform to get further guidance?A . Read the AWS Customer Agreement.B . Use AWS Artifact to access AWS compliance...

August 13, 2019 No Comments READ MORE +

Lambda function execution role What is causing the error?

A Security Engineer has created an Amazon CloudWatch event that invokes an AWS Lambda function daily. The Lambda function runs an Amazon Athena query that checks AWS CloudTrail logs in Amazon S3 to detect whether any IAM user accounts or credentials have been created in the past 30 days. The...

August 10, 2019 No Comments READ MORE +

What is the SIMPLEST way to meet these requirements?

A security team is responsible for reviewing AWS API call activity in the cloud environment for security violations. These events must be recorded and retained in a centralized location for both current and future AWS regions. What is the SIMPLEST way to meet these requirements?A . Enable AWS Trusted Advisor...

August 8, 2019 No Comments READ MORE +

Which of the following options will mitigate the threat?

A threat assessment has identified a risk whereby an internal employee could exfiltrate sensitive data from production host running inside AWS (Account 1). The threat was documented as follows: Threat description: A malicious actor could upload sensitive data from Server X by configuring credentials for an AWS account (Account 2)...

August 7, 2019 No Comments READ MORE +