The AWS Certified Security – Specialty (SCS-C03) exam tests your skills in securing AWS environments. It is designed for security professionals looking to validate their expertise in AWS security.
You are configuring IAM policies for least privilege access. Which feature should you use to ensure time-limited permissions?
AIAM Users
BIAM Roles
CTemporary Security Credentials
DResource Policies
Explanation
Temporary Security Credentials provide defined expiration, enforcing least privilege, while others do not inherently support time limits.
Q322
Which AWS service provides centralized logging of account activity?
AAWS CloudTrail
BAWS Config
CAmazon CloudWatch
DAWS Trusted Advisor
Explanation
AWS CloudTrail records account activity, while AWS Config monitors configurations.
Q323
A company needs to ensure that sensitive data is encrypted at rest in S3 buckets. What should they implement?
AS3 Block Public Access
BS3 Object Lock
CS3 Server-side Encryption
DAWS Firewall Manager
Explanation
S3 Server-side Encryption effectively encrypts data at rest, while the other options do not accomplish this.
Q324
What happens when you enable IAM policies that deny access alongside those that allow access?
AAccess is always granted.
BAccess is denied regardless.
CAccess is granted if allowed.
DAccess is determined by priority.
Explanation
Deny policies take precedence over allow policies in IAM, making access denied regardless of allows.
Q325
Which AWS service provides a centralized logging solution?
AAWS CloudTrail
BAmazon S3
CAWS Trusted Advisor
DAmazon EC2
Explanation
AWS CloudTrail captures API calls for logging, while others don’t primarily focus on logs.
Q326
A company needs to enforce multi-factor authentication (MFA) for all users. What is the best practice to implement this?
AEnable MFA in IAM settings
BAllow users to opt-in
CUse Amazon Cognito only
DDisable password policy
Explanation
Enabling MFA in IAM settings ensures all users use it, while the other options do not enforce compliance.
Q327
You are configuring a Security Group for an EC2 instance. What is the result of allowing inbound traffic on port 22 from everywhere?
ASSH access from any IP
BSSH access only from VPC
CHTTP access from any IP
DRestricted SSH access
Explanation
Allowing inbound traffic on port 22 from everywhere permits unrestricted SSH access, whereas others have incorrect implications about access.
Q328
Which AWS service allows you to manage security configurations across multiple accounts?
AAWS Security Hub
BAWS SageMaker
CAWS Batch
DAWS Glue
Explanation
AWS Security Hub provides a comprehensive view of security across accounts, while others focus on different functionalities.
Q329
A company wants to ensure API keys are not exposed in source control. Which best practice should they implement?
AStore keys in Git repository
BUse IAM roles for applications
CHardcode keys in source files
DShare keys via public channels
Explanation
Using IAM roles eliminates storing keys in code, while the other options lead to key exposure.
Q330
What happens when an Amazon S3 bucket policies allow public access to all objects?
AOnly IAM users can access objects
BAll users can read objects
CBucket becomes private automatically
DOnly logged-in users can read
Explanation
Public access allows anyone to read objects, while the other options incorrectly specify access controls.