The AWS Certified Security – Specialty (SCS-C03) exam tests your skills in securing AWS environments. It is designed for security professionals looking to validate their expertise in AWS security.
A company needs to encrypt data in transit for its S3 bucket. What is the best practice?
AUse server-side encryption
BUse client-side encryption
CUse HTTPS for access
DConfigure a VPN
Explanation
HTTPS encrypts data in transit; others address storage encryption.
Q462
You are configuring IAM roles for an EC2 instance. What happens if the instance loses its IAM role?
AIt cannot connect to the internet
BIt loses access to AWS services
CIt terminates automatically
DIt sends alerts to admins
Explanation
Losing the IAM role revokes permissions; others are not accurate implications.
Q463
Which AWS service enables DDoS mitigation for web applications?
AAWS Shield
BAmazon GuardDuty
CAWS Inspector
DAWS WAF
Explanation
AWS Shield is specifically designed for DDoS protection, while the others serve different security purposes.
Q464
A company's compliance requirements mandate logging every API request. Which service should they enable?
AAWS CloudTrail
BAmazon CloudWatch
CAWS Config
DAWS Secrets Manager
Explanation
AWS CloudTrail records API calls for compliance, unlike the other services which focus on different aspects of monitoring or configuration.
Q465
You are configuring a security group for an EC2 instance. What is the effect of allowing incoming traffic on TCP port 22?
ASSH access is permitted
BFTP access is granted
CSCP access is allowed
DRDP can be used
Explanation
Allowing TCP port 22 enables SSH access; the other options are incorrect protocols or ports.
Q466
Which AWS service provides a globally distributed content delivery network?
AAWS CloudFormation
BAmazon CloudFront
CAWS Glue
DAmazon S3
Explanation
Amazon CloudFront is specifically designed for content delivery, unlike the other services listed.
Q467
A company needs to implement fine-grained access control for their AWS resources. Which service should they use?
AAWS IAM
BAWS KMS
CAWS Shield
DAWS Config
Explanation
AWS IAM allows for detailed policy creation for resource access, which the other services do not focus on.
Q468
What happens when an IAM role is assumed by an AWS service?
AThe role is permanently deleted
BSecurity policies are bypassed
CTemporary credentials are provided
DResources are encrypted automatically
Explanation
When an IAM role is assumed, temporary credentials are issued to the service, while the other options reflect incorrect interpretations of IAM functionalities.
Q469
Which AWS service enables compliance auditing for user activities?
AAWS CloudTrail
BAmazon GuardDuty
CAWS Config
DAmazon Inspector
Explanation
AWS CloudTrail records user activity for auditing, while the others serve different security functions.
Q470
A company needs to secure data in transit between their on-premises network and AWS. What should they implement?
AAWS Direct Connect
BVPN Gateway
CAWS Storage Gateway
DAWS Shield
Explanation
A VPN Gateway encrypts data in transit, while Direct Connect focuses on bandwidth without encryption.