Amazon AWS
AWS Certified Security – Specialty
SCS-C03
The AWS Certified Security – Specialty (SCS-C03) exam tests your skills in securing AWS environments. It is designed for security professionals looking to validate their expertise in AWS security.
486 questions
0 views
Free
Questions 51–60 of 486
What happens when you enable S3 bucket versioning?
A
Previous versions are deleted
B
Storage costs increase
C
Bucket becomes public
D
Objects cannot be deleted
Reveal Answer
Explanation
Storage costs increase as multiple versions are stored, while the other options are incorrect regarding versioning mechanism.
Which AWS service helps in continuous security assessment?
A
AWS Inspector
B
AWS Shield
C
AWS Config
D
AWS WAF
Reveal Answer
Explanation
AWS Inspector automatically assesses applications for security vulnerabilities, while the others handle different aspects of security.
A company needs to control access to their S3 buckets while ensuring fine-grained permissions. What should they use?
A
IAM Policies
B
Bucket Policies
C
Network ACLs
D
Security Groups
Reveal Answer
Explanation
Bucket Policies directly enforce permissions on S3 resources, while IAM Policies provide broader user-based permissions.
What happens when an AWS Security Group is deleted?
A
All associated instances are terminated
B
The instances lose their firewall rules
C
The rules are applied to new groups
D
Resources are put into quarantine
Reveal Answer
Explanation
When a Security Group is deleted, associated instances lose their firewall rules, affecting inbound/outbound traffic.
Which AWS service helps you assess security vulnerabilities in your cloud environment?
A
AWS Inspector
B
AWS CloudTrail
C
AWS Config
D
AWS Shield
Reveal Answer
Explanation
AWS Inspector performs security assessments, while others focus on logging or compliance monitoring.
A company uses Amazon S3 for data storage and wants to restrict access to certain IAM roles. What is the best approach?
A
Bucket Policies
B
EC2 Security Groups
C
IAM User Groups
D
Route 53 Permissions
Reveal Answer
Explanation
Bucket Policies directly control S3 access based on IAM roles, while others aren't applicable in this context.
What happens when an IAM user is assigned permissions using both a policy and an explicit deny rule?
A
Access is granted
B
Access is denied
C
Access is evaluated ignored
D
Policies override denies
Reveal Answer
Explanation
Explicit deny rules always take precedence over allow permissions in IAM policies.
Which AWS service encrypts data at rest, using customer-managed keys?
A
AWS Key Management Service (KMS)
B
AWS Shield
C
Amazon CloudWatch
D
AWS CloudTrail
Reveal Answer
Explanation
AWS KMS manages encryption keys for data at rest, while the others serve different functions.
A company needs to ensure that all IAM user actions are logged. What should they enable?
A
CloudTrail logging
B
VPC Flow Logs
C
AWS Config
D
S3 Access Logs
Reveal Answer
Explanation
AWS CloudTrail logs API calls made by IAM users; the others track different resources or events.
What happens when an instance in a public subnet's security group allows port 22 but its network ACL denies inbound traffic on that port?
A
Access is denied completely
B
Access is allowed on port 22
C
Traffic is logged by AWS
D
Security groups override NACLs
Reveal Answer
Explanation
Network ACLs take precedence over security groups, thus denying access completely.