The AWS Certified Security – Specialty (SCS-C03) exam tests your skills in securing AWS environments. It is designed for security professionals looking to validate their expertise in AWS security.
A company needs to enforce least privilege access on IAM roles. What should you do?
AAssign roles to all users
BUse identity-based policies
CUse data encryption
DMonitor API calls
Explanation
Using identity-based policies allows precise permissions; other options do not enforce least privilege.
Q162
You are configuring AWS Config rules for compliance. What happens when a resource doesn't comply with a rule?
AIt is automatically deleted
BIt is marked as non-compliant
CNotifications are ignored
DNo action taken at all
Explanation
Non-compliance is flagged in AWS Config for visibility; other options incorrectly describe resource behavior.
Q163
Which AWS service helps to comply with data privacy regulations?
AAWS Artifact
BAWS Inspector
CAWS CloudTrail
DAWS Firewall Manager
Explanation
AWS Artifact provides compliance reports and security certifications, while others focus on different security aspects.
Q164
A company needs to securely manage access to its AWS resources for a growing team. Which approach is the best practice?
AUse AWS root account for all actions
BCreate IAM roles for users
CShare IAM user passwords
DDisable MFA for all accounts
Explanation
Creating IAM roles for users allows secure access management without exposing sensitive credentials, unlike the other options.
Q165
What happens when a user attempts to access resources beyond their IAM permission?
AAccess is granted due to default settings
BAccess is denied according to least privilege
CAccess is logged and reported automatically
DAccess is granted if user is an admin
Explanation
IAM follows the principle of least privilege, denying access to unauthorized actions, while others are incorrect interpretations of IAM behavior.
Q166
Which service helps to detect anomalous behavior in AWS accounts?
AAWS CloudTrail
BAmazon GuardDuty
CAWS Config
DAWS Inspector
Explanation
Amazon GuardDuty provides threat detection based on anomalous behavior, while others serve different monitoring functions.
Q167
A company needs to enforce MFA for all users in an IAM group. What should they do?
AEnable password policies
BAttach an IAM policy requiring MFA
CUse Amazon Cognito for authentication
DSetup CloudWatch alarms on logins
Explanation
Attaching an IAM policy to require MFA is the correct step, while others do not enforce MFA directly.
Q168
What happens when an Amazon S3 bucket's public access is fully blocked?
AAll objects are deleted
BPublic ACLs are ignored
CLogging is disabled
DBucket cannot be accessed at all
Explanation
Blocking public access ignores any public ACLs but does not impact bucket access from authorized users.
Q169
Which AWS service provides automated threat detection for AWS accounts?
AAWS Config
BAWS GuardDuty
CAWS CloudTrail
DAWS Inspector
Explanation
AWS GuardDuty automatically monitors for malicious activity, while others focus on compliance or logging.
Q170
A company needs to allow access to an S3 bucket from a specific IP range. What is the best way to achieve this?
AUse Security Group rules.
BConfigure an IAM policy.
CSet a bucket policy.
DImplement VPC endpoint policies.
Explanation
A bucket policy can specifically restrict access based on IP addresses, unlike the other options.