The AWS Certified Security – Specialty (SCS-C03) exam tests your skills in securing AWS environments. It is designed for security professionals looking to validate their expertise in AWS security.
A company needs to allow only certain users to assume a role. What should be added to the IAM policy?
ACondition key for user IP
BOn-demand session permissions
CPolicy versioning applied
DTrust relationship conditions
Explanation
A trust relationship condition controls which users can assume the role, while the other options do not directly address this requirement.
Q42
You are configuring AWS Key Management Service (KMS). What happens if a key policy grants access but a user has no IAM permissions?
AUser can still access the key
BUser cannot access the key
CAccess depends on key status
DIAM permissions override key policies
Explanation
Without appropriate IAM permissions, users can neither use the key nor perform operations on it, regardless of the key policy.
Q43
Which AWS service allows secure connections from on-premises to AWS?
AAWS Direct Connect
BAWS Lambda
CAmazon S3
DAWS CloudFormation
Explanation
AWS Direct Connect provides a dedicated network connection, while others do not facilitate secure connections.
Q44
A company needs to ensure that their API Gateway does not expose sensitive information if misconfigured. What should they enable?
ACORS Configuration
BAWS WAF
CResource Policies
DCloudTrail Logging
Explanation
AWS WAF protects APIs from common web exploits, while others do not specifically address security vulnerabilities.
Q45
What happens when IAM policies lack explicit deny actions?
AAccess is granted by default
BAccess is always denied
COnly root users can access
DPermissions are inherited from resources
Explanation
Lacking explicit deny means access is allowed by default, while the other options misinterpret IAM policy behavior.
Q46
Which AWS service provides scalable object storage?
AAmazon S3
BAmazon RDS
CAmazon EBS
DAmazon DynamoDB
Explanation
Amazon S3 is designed for scalable object storage, while the others serve different data storage functions.
Q47
A company needs to manage temporary access for third-party developers. What should they use?
AIAM Roles
BAWS Direct Connect
CSecurity Groups
DAWS Lambda
Explanation
IAM Roles allow temporary access and permissions; the others do not provide the same functionality for access control.
Q48
You are configuring a VPC peering connection. What should you ensure about route tables?
AOnly one route is needed
BRoutes must be mutually updated
CDefault routes override custom ones
DRoute table modification is optional
Explanation
Both VPC route tables must be updated to ensure connectivity; the other options misinterpret VPC routing rules.
Q49
Which AWS service provides continuous compliance monitoring?
AAWS Config
BAmazon Inspector
CAWS Shield
DAWS CloudTrail
Explanation
AWS Config continuously monitors compliance against defined rules, while the others serve different security functions.
Q50
A company needs to enforce the principle of least privilege in IAM roles. What should they do?
AAudit permissions regularly
BUse AWS Organizations
CAssign permissions broadly
DUse policy conditions effectively
Explanation
Using policy conditions effectively limits permissions to the least necessary, whereas the other options don't directly enforce least privilege.