The AWS Certified Security – Specialty (SCS-C03) exam tests your skills in securing AWS environments. It is designed for security professionals looking to validate their expertise in AWS security.
Explanation
Deleting an IAM user revokes all associated permissions immediately.
Q82
Which service provides real-time AWS Cloud trail log monitoring and alerting?
AAmazon GuardDuty
BAWS Config
CAWS CloudTrail
DAWS CloudWatch
Explanation
Amazon GuardDuty detects suspicious activity but does real-time monitoring of CloudTrail logs, while others do not specialize in this.
Q83
A company needs to ensure security compliance for access to its S3 buckets. Which feature should it implement?
ABucket Versioning
BBucket Policies
CPublic Access Block
DCross-Region Replication
Explanation
Bucket Policies enforce compliance by managing access permissions, while the others provide utility but not direct compliance controls.
Q84
What happens when an EC2 instance's IAM role is removed while it is running?
AInstantly loses all access rights
BRetains access until reboot
CAccess rights remain unchanged
DAccess rights only lost for new requests
Explanation
Removing the IAM role causes the instance to lose permissions for any new requests, but retains existing access in session until then.
Q85
Which AWS service provides the capability to manage user identities and permissions?
AAWS IAM
BAmazon RDS
CAWS Lambda
DAmazon S3
Explanation
AWS IAM is designed for managing user identities and permissions; the others focus on data management or serverless functions.
Q86
A company needs to ensure confidential data is encrypted both at rest and in transit. Which approach should they take?
AUse S3's default encryption only.
BImplement SSL/TLS and use KMS.
COnly encrypt databases at rest.
DUse IAM roles for encryption.
Explanation
Implementing SSL/TLS and using KMS ensures encryption both at rest and in transit, while the other options are either insufficient or restrict encryption capabilities.
Q87
What happens when a security group associated with an EC2 instance does not allow inbound traffic?
ATraffic is accepted.
BTraffic is blocked by default.
CTraffic is logged.
DTraffic is routed elsewhere.
Explanation
Security groups block inbound traffic unless explicitly allowed; the other options misrepresent how security groups operate.
Q88
Which service offers centralized logging across AWS accounts?
AAWS CloudTrail
BAmazon S3
CAWS Config
DAmazon CloudWatch
Explanation
AWS CloudTrail records and centralizes account activity, while others focus on storage, compliance, or metrics.
Q89
A company needs to apply strong password policies across its AWS account. Which AWS service should they use?
AAWS Organizations
BAWS IAM
CAWS Shield
DAmazon Inspector
Explanation
AWS IAM allows you to enforce password policies, while others do not manage password settings.
Q90
What happens when you configure an S3 bucket policy allowing access to 'Everyone'?
AOnly authenticated users can access.
BData becomes publicly accessible.
CAccess is denied for all users.
DPolicy is ignored by S3.
Explanation
Allowing access to 'Everyone' makes the bucket public, whereas the other options either misunderstand or misrepresent access settings.