The AWS Certified Security – Specialty (SCS-C03) exam tests your skills in securing AWS environments. It is designed for security professionals looking to validate their expertise in AWS security.
What happens when an IAM user tries to access a resource without the required permissions?
AAccess is granted by default.
BAccess is denied.
CUser is logged out.
DAccess is granted with warnings.
Explanation
AWS IAM implements deny by default, ensuring access is denied if permissions are not explicitly granted.
Q472
Which service provides centralized logging of AWS API calls?
AAWS CloudTrail
BAmazon CloudWatch
CAWS Config
DAWS IAM
Explanation
CloudTrail logs API calls, while CloudWatch monitors metrics, Config tracks resource changes, and IAM manages permissions.
Q473
A company needs to ensure that a critical web application can recover quickly in case of a disaster. What AWS feature should they leverage?
AAWS Snowball
BAWS Elastic Beanstalk
CAWS Backup
DAmazon Route 53
Explanation
AWS Backup automates backups for quick recovery; Snowball is for data transfer, Elastic Beanstalk deploys apps, and Route 53 manages DNS.
Q474
You are configuring security for an S3 bucket. What happens when you set the bucket policy to 'Allow' all actions to 'Everyone'?
AOnly authenticated users can access.
BBucket is publicly accessible.
CNo changes can be made.
DOnly admins can upload.
Explanation
The policy makes the bucket publicly accessible, while A restricts access, C prevents all changes, and D limits uploads.
Q475
Which service allows you to automate compliance checks in AWS resources?
AAWS Config
BAWS Shield
CAWS WAF
DAmazon Inspector
Explanation
AWS Config monitors and evaluates AWS resource configurations against compliance rules, while the others focus on security protection and assessments.
Q476
A company needs to securely share files between its S3 buckets across different AWS accounts. What solution should they implement?
ABucket Policy
BIAM Role
CResource Access Manager
DAccess Control List
Explanation
Bucket Policies are used to define permissions for accessing buckets across accounts, while IAM roles and ACLs do not serve this purpose effectively.
Q477
What happens when an AWS KMS key is deleted but still associated with an active resource?
AThe resource will become unusable
BThe key can be recovered after deletion
CThe key is permanently lost
DThe resource automatically uses a different key
Explanation
Deleting a KMS key renders encrypted resources unusable, while the other options incorrectly suggest recovery or seamless switching.
Q478
Which service provides fine-grained access control for application resources?
AAWS Identity and Access Management (IAM)
BAmazon S3
CAWS Key Management Service (KMS)
DAmazon CloudFront
Explanation
IAM allows users to create policies for fine-grained control, while others manage resources.
Q479
A company needs to manage an encryption key lifecycle. Which AWS service should they use?
AAWS CloudTrail
BAWS Key Management Service (KMS)
CAmazon RDS
DAWS Secrets Manager
Explanation
AWS KMS is specifically designed for key management, unlike the others.
Q480
What happens when a user exceeds their EC2 service limits?
ATheir instances are terminated immediately.
BNo new instances will launch.
CAll running instances are stopped.
DService is automatically upgraded.
Explanation
New instances cannot be launched if limits are exceeded; existing ones remain unaffected.