The AWS Certified Security – Specialty (SCS-C03) exam tests your skills in securing AWS environments. It is designed for security professionals looking to validate their expertise in AWS security.
What happens when an S3 bucket policy denies access to all users?
AOnly specific users are allowed access
BAccess is granted to public users
CNo users can access the bucket
DOnly logged-in IAM users can access
Explanation
A deny policy overrides all access, preventing any user from accessing the bucket.
Q112
Which service helps manage AWS user access and permissions?
AAWS IAM
BAWS S3
CAWS EC2
DAWS CloudWatch
Explanation
AWS IAM specifically manages user access and permissions, while the others serve different purposes.
Q113
A company needs to securely share sensitive data across multiple organizations. Which AWS service is best suited for this task?
AAWS Secrets Manager
BAWS VPN
CAWS Transfer Family
DAWS KMS
Explanation
AWS Transfer Family allows secure data transfer, while the others focus on different security aspects.
Q114
What happens when you delete an AWS KMS key?
AData encrypted with it stays accessible
BAll encrypted data is instantly deleted
CYou cannot recover encrypted data afterwards
DAccess to it is simply revoked
Explanation
Once a KMS key is deleted, the data encrypted with it becomes permanently inaccessible, while the other options don't accurately describe the consequence.
Q115
Which service provides additional security for your Amazon S3 buckets?
AAWS IAM
BAWS Macie
CAWS CloudFormation
DAWS CloudWatch
Explanation
AWS Macie identifies and helps protect sensitive data in S3; IAM manages permissions but does not provide data security analysis.
Q116
You are configuring AWS Security Groups for your EC2 instance; what happens if you set the ingress rule to deny all inbound traffic?
ANo external connections are allowed.
BOnly internal communications are allowed.
CThe instance will fail to start.
DCloudFront will access the instance.
Explanation
Denying all inbound traffic blocks external connections, but the instance will still run.
Q117
A company needs to encrypt data at rest in DynamoDB; which method provides the highest level of security control?
AAWS managed keys (SSE-KMS)
BClient-side encryption
CDefault encryption settings
DEncryption in transit only
Explanation
Client-side encryption gives complete control over the keys used, whereas AWS managed keys are managed by AWS.
Q118
Which AWS service provides continuous monitoring for security compliance?
AAWS CloudTrail
BAWS Config
CAWS Shield
DAmazon GuardDuty
Explanation
AWS Config continuously monitors and records resource configurations, helping ensure compliance, while others focus on logging, protection, or threat detection.
Q119
A company needs to provide IAM access to third-party contractors. What is the best practice?
ACreate IAM users for each contractor.
BShare existing IAM user credentials.
CUse IAM roles with temporary credentials.
DCreate resource policies for access.
Explanation
Using IAM roles with temporary credentials is the best practice for third-party access, whereas other options create security risks or lack control.
Q120
What happens when you enable MFA on an IAM user?
AUser bypasses password requirements.
BUser requires extra authentication step.
CUser's access keys are deleted.
DUser cannot use the console.
Explanation
Enabling MFA requires the user to provide an additional authentication factor, enhancing security, while the other options are incorrect interpretations of MFA.