Amazon AWS
AWS Certified Security – Specialty
SCS-C03
The AWS Certified Security – Specialty (SCS-C03) exam tests your skills in securing AWS environments. It is designed for security professionals looking to validate their expertise in AWS security.
486 questions
0 views
Free
Questions 381–390 of 486
You are configuring a security group. What happens if you add an inbound rule allowing all traffic?
A
Blocks all outbound traffic
B
Allows all inbound traffic only
C
Restricts access to specific IPs
D
Opens all inbound ports to the instance
Reveal Answer
Explanation
Adding an inbound rule for all traffic opens all inbound ports; the others pertain to different security configurations.
Which AWS service provides real-time threat detection?
A
AWS GuardDuty
B
AWS CloudTrail
C
AWS Config
D
AWS Inspector
Reveal Answer
Explanation
AWS GuardDuty offers real-time threat detection; the others provide different monitoring and compliance features.
A company needs to enforce IAM policies for specific actions. Which approach is best?
A
AWS Organizations
B
Service Control Policies
C
IAM Roles
D
IAM Multi-Factor Authentication
Reveal Answer
Explanation
Service Control Policies allow organizations to enforce policies across accounts; the others don't enforce cross-account policies.
What happens when a user tries to access a resource not defined in their IAM permission?
A
Access is granted
B
Access is denied
C
Access is logged
D
Access is temporarily granted
Reveal Answer
Explanation
Access is denied if not explicitly permitted in IAM policies; the other options are incorrect interpretations of IAM behavior.
Which AWS service enables you to enforce data protection policies across your organization?
A
AWS Config
B
AWS CloudTrail
C
AWS Shield
D
Amazon S3
Reveal Answer
Explanation
AWS Config allows you to evaluate compliance with policies, while the others focus on monitoring or protecting against DDoS attacks.
You are configuring an S3 bucket for public access. Which setting should you apply to ensure objects within the bucket cannot be publicly readable?
A
Block all public access settings
B
Set bucket policy to allow public access
C
Use IAM roles for S3 access
D
Enable static website hosting
Reveal Answer
Explanation
Block all public access settings completely restricts public access; others either allow or do not manage access.
What happens when you delete a user from IAM?
A
All resources owned by user deleted
B
User permissions revoke immediately
C
User data stored in temporary buckets
D
Access keys remain active for 30 days
Reveal Answer
Explanation
User permissions are revoked upon deletion; however, resources and access keys are immediately inactive.
Which service provides DDoS protection for applications?
A
AWS Shield
B
AWS WAF
C
AWS GuardDuty
D
AWS Inspector
Reveal Answer
Explanation
AWS Shield specifically provides DDoS protection, whereas the others focus on different security aspects.
A company needs to automatically rotate AWS IAM user credentials securely. Which service should be implemented?
A
AWS Secrets Manager
B
AWS CloudTrail
C
AWS Config
D
AWS Systems Manager
Reveal Answer
Explanation
AWS Secrets Manager is designed for automating credential rotation, unlike the other options which serve different functions.
You are configuring an S3 bucket for public access. What happens if Bucket Policy allows public access?
A
Bucket is always accessible to everyone
B
Public access is denied by default
C
Bucket can still be private
D
Bucket should have an ACL set
Reveal Answer
Explanation
If the Bucket Policy allows public access, it overrides the default deny behavior, making it accessible to everyone.