The AWS Certified Security – Specialty (SCS-C03) exam tests your skills in securing AWS environments. It is designed for security professionals looking to validate their expertise in AWS security.
You are configuring an IAM role for an EC2 instance. What happens if the role is not correctly associated?
AInstance runs with full access
BAll services fail to respond
CInstance runs without permissions
DInstance logs unauthorized access
Explanation
Without the role, the instance cannot access AWS resources, while the other options suggest incorrect outcomes.
Q142
Which AWS service provides a detailed inventory of S3 objects?
AAWS CloudTrail
BAWS Config
CS3 Inventory
DAmazon CloudWatch
Explanation
S3 Inventory is designed specifically for reporting on S3 objects, while the others serve different monitoring or compliance purposes.
Q143
A company needs to ensure that only designated IP addresses can access their AWS resources. What should they implement?
ANetwork ACLs
BIAM Policies
CSecurity Groups
DRoute 53
Explanation
Network ACLs are the correct choice for controlling access by IP address, while IAM policies and Security Groups are used for different access control layers.
Q144
You are configuring an AWS IAM role to allow an EC2 instance to access an S3 bucket. What is required to enable this access?
AS3 Bucket Policy alone
BIAM Role attached to EC2
CIAM User credentials
DPublic Access Settings
Explanation
The IAM Role must be attached to the EC2 instance to authorize it to access the S3 bucket, while the other options do not fulfill this requirement properly.
Q145
Which service enables encryption for data at rest in S3?
AS3 Server-Side Encryption
BS3 Transfer Acceleration
CIAM Roles
DAWS Shield
Explanation
S3 Server-Side Encryption provides encryption for data at rest, whereas the other options serve different purposes.
Q146
A company needs to enforce multi-factor authentication (MFA) for all users accessing the AWS Management Console. What should they implement?
AIAM Policies only
BMFA devices with IAM Users
CAWS Organizations service access
DSingle Sign-On authentication
Explanation
MFA devices are specifically designed for enhancing security for IAM users, unlike the other options.
Q147
You are configuring an Amazon RDS instance. What happens if you don't create a backup before deleting an instance?
AYou can restore from point-in-time
BData is permanently lost
CInstance will be archived
DDeletion can be undone later
Explanation
Without a backup, data is permanently lost; only point-in-time backups allow for restores.
Q148
Which AWS service helps prevent DDoS attacks?
AAWS Shield
BAWS Trusted Advisor
CAWS IAM
DAWS Inspector
Explanation
AWS Shield specializes in DDoS protection while the others focus on different areas.
Q149
A company needs to share sensitive data with external partners securely. Which AWS service is best suited for this?
AAWS S3 Bucket Policies
BAWS KMS
CAWS Transfer Family
DAWS CloudTrail
Explanation
AWS Transfer Family is designed for secure file transfers to partners, while the others do not specifically address data sharing needs.
Q150
What happens when an IAM user's permissions are assigned directly to another user instead of using IAM groups?
APermissions stack regardless
BPermissions are inherited
CNo permissions granted
DPermissions must be managed individually
Explanation
Managing permissions individually can lead to increased administrative overhead compared to using IAM groups for simplification.