How would the organization manage its resources in the MOST secure manner?

A financial institution has the following security requirements: • Cloud-based users must be contained in a separate authentication domain. • Cloud-based users cannot access on-premises systems. As part of standing up a cloud environment, the financial institution is creating a number of Amazon managed databases and Amazon EC2 instances. An...

January 9, 2021 No Comments READ MORE +

Which steps should the security engineer take to satisfy this requirement while maintaining least privilege?

A security engineer has been tasked with implementing a solution that allows the company's development team to have interactive command line access to Amazon EC2 Linux instances using the AWS Management Console. Which steps should the security engineer take to satisfy this requirement while maintaining least privilege?A . Enable AWS...

January 9, 2021 No Comments READ MORE +

Which set of actions will identify the suspect attacker's IP address for future occurrences?

A company's web application is hosted on Amazon EC2 instances running behind an Application Load Balancer (ALB) in an Auto Scaling group. An AWS WAF web ACL is associated with the ALB. AWS CloudTrail is enabled, and stores logs in Amazon S3 and Amazon CloudWatch Logs. The operations team has...

January 9, 2021 No Comments READ MORE +

When approach MOST efficiently meets the company's needs?

A company wants to encrypt data locally while meeting regulatory requirements related to key exhaustion. The encryption key can be no more than 10 days old or encrypt more than 2" 16 objects Any encryption key must be generated on a FlPS-validated hardware security module (HSM). The company is cost-conscious,...

January 9, 2021 No Comments READ MORE +

What should a security engineer recommend to meet these requirements?

A company has several critical applications running on a large fleet of Amazon EC2 instances. As part of a security operations review, the company needs to apply a critical operating system patch to EC2 instances within 24 hours of the patch becoming available from the operating system vendor. The company...

January 9, 2021 No Comments READ MORE +

What is the simplest and MOST effective way to protect the content?

A company uses HTTP Live Streaming (HLS) to stream live video content to paying subscribers by using Amazon CloudFront. HLS splits the video content into chunks so that the user can request the right chunk based on different conditions Because the video events last for several hours, the total video...

January 9, 2021 No Comments READ MORE +

Which combination of actions will meet this requirement?

A company's application runs on Amazon EC2 and stores data in an Amazon S3 bucket The company wants additional security controls in place to limit the likelihood of accidental exposure of data to external parties. Which combination of actions will meet this requirement? (Select THREE.)A . Encrypt the data in...

January 9, 2021 No Comments READ MORE +

Which solution will meet this requirement?

A security engineer is auditing a production system and discovers several additional IAM roles that are not required and were not previously documented during the last audit 90 days ago. The engineer is trying to find out who created these IAM roles and when they were created. The solution must...

January 9, 2021 No Comments READ MORE +

What should a Security Engineer do to troubleshoot this error?

A company is using AWS Organizations to manage multiple AWS accounts. The company has an application that allows users to assume the AppUser IAM role to download files from an Amazon S3 bucket that is encrypted with an AWS KMS CMK However when users try to access the files in...

January 8, 2021 No Comments READ MORE +

Which combination of actions using AWS services should the security engineer take to accomplish this goal?

A security engineer needs to configure monitonng and auditing for AWS Lambda. Which combination of actions using AWS services should the security engineer take to accomplish this goal? (Select TWO.)A . Use AWS Config to track configuration changes to Lambda functions, runtime environments, tags, handler names, code sizes, memory allocation,...

January 8, 2021 No Comments READ MORE +