The AWS Certified Security – Specialty (SCS-C03) exam tests your skills in securing AWS environments. It is designed for security professionals looking to validate their expertise in AWS security.
A company needs to comply with GDPR for storing user data. What is the best practice when using AWS?
AStore all data in one region
BUse S3 versioning
CEnable encryption at rest
DAllow global access to buckets
Explanation
Enabling encryption at rest secures data per GDPR requirements, while other options don't address compliance effectively.
Q432
You are configuring a security group for an EC2 instance. What happens when you remove an inbound rule allowing HTTP access?
AEC2 instance loses internet access
BTraffic stays accessible from the public
CNo effect on existing connections
DAll traffic is blocked
Explanation
Removing the rule affects only future connections; existing connections remain intact until closed.
Q433
Which AWS service is primarily used for federated authentication?
AAWS IAM
BAmazon CloudWatch
CAWS Cognito
DAWS Direct Connect
Explanation
AWS Cognito enables user sign-up, sign-in, and access via federated identities, while the others do not focus on federated authentication.
Q434
You are configuring S3 bucket policies. What happens when a policy allows public access?
AAccess is open to everyone.
BAccess is denied to everyone.
CAccess requires IAM roles.
DOnly specific IPs can access.
Explanation
A bucket policy that allows public access grants access to all users regardless of IAM roles or IP restrictions.
Q435
A company needs to secure Lambda functions. What is the best method to limit their execution permissions?
AIAM Role with restrictions.
BVPC for all Lambda functions.
CAPI Gateway authorization only.
DNo permissions are needed.
Explanation
IAM roles define the permissions of Lambda functions, while the other options do not adequately limit execution permissions.
Q436
Which AWS service helps with data classification and protection?
AAWS Macie
BAWS CloudTrail
CAWS Inspector
DAWS Config
Explanation
AWS Macie identifies and protects sensitive data, while the others focus on different compliance and monitoring tasks.
Q437
A company needs to enforce IAM policies that allow users to access specific S3 buckets based on their job roles. What should they implement?
AResource-based policies
BService control policies
CIAM permissions boundaries
DIAM roles
Explanation
Resource-based policies directly control access to S3 buckets for specific user roles, while the others do not directly address S3 bucket access based on roles.
Q438
You are configuring security for a Lambda function. Which practice improves its security posture the most?
AAssign a wide execution role
BUse environment variables for sensitive info
CVPC integration for network isolation
DUsing multiple triggers
Explanation
VPC integration provides network isolation, significantly enhancing security compared to the other options that either weaken security or do not affect it.
Q439
Which service provides DDoS protection on AWS?
AAWS Shield
BAWS Firewall Manager
CAmazon CloudFront
DAWS WAF
Explanation
AWS Shield specifically offers DDoS protection, while others focus on different security aspects.
Q440
A company needs to encrypt data at rest in S3. What should they use?
AS3 Default Encryption
BIAM Roles
CS3 Access Control Lists
DVPC Security Groups
Explanation
S3 Default Encryption automatically encrypts data at rest; other options do not provide encryption.