AWS Certified Security - Specialty v1.0 (AWS Certified Security - Specialty)

Page:    1 / 17   
Total 243 questions

A distributed web application is installed across several EC2 instances in public subnets residing in two Availability Zones. Apache logs show several intermittent brute-force attacks from hundreds of IP addresses at the layer 7 level over the past six months.
What would be the BEST way to reduce the potential impact of these attacks in the future?

  • A. Use custom route tables to prevent malicious traffic from routing to the instances.
  • B. Update security groups to deny traffic from the originating source IP addresses.
  • C. Use network ACLs.
  • D. Install intrusion prevention software (IPS) on each instance.


Answer : C

A company plans to move most of its IT infrastructure to AWS. They want to leverage their existing on-premises Active Directory as an identity provider for AWS.
Which combination of steps should a Security Engineer take to federate the companyג€™s on-premises Active Directory with AWS? (Choose two.)

  • A. Create IAM roles with permissions corresponding to each Active Directory group.
  • B. Create IAM groups with permissions corresponding to each Active Directory group.
  • C. Configure Amazon Cloud Directory to support a SAML provider.
  • D. Configure Active Directory to add relying party trust between Active Directory and AWS.
  • E. Configure Amazon Cognito to add relying party trust between Active Directory and AWS.


Answer : AD

Reference:
https://aws.amazon.com/blogs/security/aws-federated-authentication-with-active-directory-federation-services-ad-fs/

A security alert has been raised for an Amazon EC2 instance in a customer account that is exhibiting strange behavior. The Security Engineer must first isolate the
EC2 instance and then use tools for further investigation.
What should the Security Engineer use to isolate and research this event? (Choose three.)

  • A. AWS CloudTrail
  • B. Amazon Athena
  • C. AWS Key Management Service (AWS KMS)
  • D. VPC Flow Logs
  • E. AWS Firewall Manager
  • F. Security groups


Answer : ADF

A financial institution has the following security requirements:
✑ Cloud-based users must be contained in a separate authentication domain.
✑ Cloud-based users cannot access on-premises systems.
As part of standing up a cloud environment, the financial institution is creating a number of Amazon managed databases and Amazon EC2 instances. An Active
Directory service exists on-premises that has all the administrator accounts, and these must be able to access the databases and instances.
How would the organization manage its resources in the MOST secure manner? (Choose two.)

  • A. Configure an AWS Managed Microsoft AD to manage the cloud resources.
  • B. Configure an additional on-premises Active Directory service to manage the cloud resources.
  • C. Establish a one-way trust relationship from the existing Active Directory to the new Active Directory service.
  • D. Establish a one-way trust relationship from the new Active Directory to the existing Active Directory service.
  • E. Establish a two-way trust between the new and existing Active Directory services.


Answer : BC

An organization wants to be alerted when an unauthorized Amazon EC2 instance in its VPC performs a network port scan against other instances in the VPC.
When the Security team performs its own internal tests in a separate account by using pre-approved third-party scanners from the AWS Marketplace, the Security team also then receives multiple Amazon GuardDuty events from Amazon CloudWatch alerting on its test activities.
How can the Security team suppress alerts about authorized security tests while still receiving alerts about the unauthorized activity?

  • A. Use a filter in AWS CloudTrail to exclude the IP addresses of the Security teamג€™s EC2 instances.
  • B. Add the Elastic IP addresses of the Security teamג€™s EC2 instances to a trusted IP list in Amazon GuardDuty.
  • C. Install the Amazon Inspector agent on the EC2 instances that the Security team uses.
  • D. Grant the Security teamג€™s EC2 instances a role with permissions to call Amazon GuardDuty API operations.


Answer : C

An organization is moving non-business-critical applications to AWS while maintaining a mission-critical application in an on-premises data center. An on-premises application must share limited confidential information with the applications in AWS. The internet performance is unpredictable.
Which configuration will ensure continued connectivity between sites MOST securely?

  • A. VPN and a cached storage gateway
  • B. AWS Snowball Edge
  • C. VPN Gateway over AWS Direct Connect
  • D. AWS Direct Connect


Answer : C

An application has been built with Amazon EC2 instances that retrieve messages from Amazon SQS. Recently, IAM changes were made and the instances can no longer retrieve messages.
What actions should be taken to troubleshoot the issue while maintaining least privilege? (Choose two.)

  • A. Configure and assign an MFA device to the role used by the instances.
  • B. Verify that the SQS resource policy does not explicitly deny access to the role used by the instances.
  • C. Verify that the access key attached to the role used by the instances is active.
  • D. Attach the AmazonSQSFullAccess managed policy to the role used by the instances.
  • E. Verify that the role attached to the instances contains policies that allow access to the queue.


Answer : BE

Reference:
https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/sqs-using-identity-based-policies.html

A company has a forensic logging use case whereby several hundred applications running on Docker on EC2 need to send logs to a central location. The Security
Engineer must create a logging solution that is able to perform real-time analytics on the log files, grants the ability to replay events, and persists data.
Which AWS Services, together, can satisfy this use case? (Choose two.)

  • A. Amazon Elasticsearch
  • B. Amazon Kinesis
  • C. Amazon SQS
  • D. Amazon CloudWatch
  • E. Amazon Athena


Answer : BD

Which of the following is the most efficient way to automate the encryption of AWS CloudTrail logs using a Customer Master Key (CMK) in AWS KMS?

  • A. Use the KMS direct encrypt function on the log data every time a CloudTrail log is generated.
  • B. Use the default Amazon S3 server-side encryption with S3-managed keys to encrypt and decrypt the CloudTrail logs.
  • C. Configure CloudTrail to use server-side encryption using KMS-managed keys to encrypt and decrypt CloudTrail logs.
  • D. Use encrypted API endpoints so that all AWS API calls generate encrypted CloudTrail log entries using the TLS certificate from the encrypted API call.


Answer : C

Reference:
https://docs.aws.amazon.com/awscloudtrail/latest/userguide/encrypting-cloudtrail-log-files-with-aws-kms.html

An organization is using AWS CloudTrail, Amazon CloudWatch Logs, and Amazon CloudWatch to send alerts when new access keys are created. However, the alerts are no longer appearing in the Security Operations mail box.
Which of the following actions would resolve this issue?

  • A. In CloudTrail, verify that the trail logging bucket has a log prefix configured.
  • B. In Amazon SNS, determine whether the ג€Account spend limitג€ has been reached for this alert.
  • C. In SNS, ensure that the subscription used by these alerts has not been deleted.
  • D. In CloudWatch, verify that the alarm threshold ג€consecutive periodsג€ value is equal to, or greater than 1.


Answer : D

A Security Engineer must add additional protection to a legacy web application by adding the following HTTP security headers:
-Content Security-Policy
-X-Frame-Options
-X-XSS-Protection
The Engineer does not have access to the source code of the legacy web application.
Which of the following approaches would meet this requirement?

  • A. Configure an Amazon Route 53 routing policy to send all web traffic that does not include the required headers to a black hole.
  • B. Implement an AWS [email protected] origin response function that inserts the required headers.
  • C. Migrate the legacy application to an Amazon S3 static website and front it with an Amazon CloudFront distribution.
  • D. Construct an AWS WAF rule to replace existing HTTP headers with the required security headers by using regular expressions.


Answer : B

During a security event, it is discovered that some Amazon EC2 instances have not been sending Amazon CloudWatch logs.
Which steps can the Security Engineer take to troubleshoot this issue? (Choose two.)

  • A. Connect to the EC2 instances that are not sending the appropriate logs and verify that the CloudWatch Logs agent is running.
  • B. Log in to the AWS account and select CloudWatch Logs. Check for any monitored EC2 instances that are in the ג€Alertingג€ state and restart them using the EC2 console.
  • C. Verify that the EC2 instances have a route to the public AWS API endpoints.
  • D. Connect to the EC2 instances that are not sending logs. Use the command prompt to verify that the right permissions have been set for the Amazon SNS topic.
  • E. Verify that the network access control lists and security groups of the EC2 instances have the access to send logs over SNMP.


Answer : AB

A Security Engineer discovers that developers have been adding rules to security groups that allow SSH and RDP traffic from 0.0.0.0/0 instead of the organization firewall IP.
What is the most efficient way to remediate the risk of this activity?

  • A. Delete the internet gateway associated with the VPC.
  • B. Use network access control lists to block source IP addresses matching 0.0.0.0/0.
  • C. Use a host-based firewall to prevent access from all but the organizationג€™s firewall IP.
  • D. Use AWS Config rules to detect 0.0.0.0/0 and invoke an AWS Lambda function to update the security group with the organization's firewall IP.


Answer : B

In response to the past DDoS attack experiences, a Security Engineer has set up an Amazon CloudFront distribution for an Amazon S3 bucket. There is concern that some users may bypass the CloudFront distribution and access the S3 bucket directly.
What must be done to prevent users from accessing the S3 objects directly by using URLs?

  • A. Change the S3 bucket/object permission so that only the bucket owner has access.
  • B. Set up a CloudFront origin access identity (OAI), and change the S3 bucket/object permission so that only the OAI has access.
  • C. Create IAM roles for CloudFront, and change the S3 bucket/object permission so that only the IAM role has access.
  • D. Redirect S3 bucket access to the corresponding CloudFront distribution.


Answer : B

A company plans to move most of its IT infrastructure to AWS. The company wants to leverage its existing on-premises Active Directory as an identity provider for
AWS.
Which steps should be taken to authenticate to AWS services using the company's on-premises Active Directory? (Choose three.)

  • A. Create IAM roles with permissions corresponding to each Active Directory group.
  • B. Create IAM groups with permissions corresponding to each Active Directory group.
  • C. Create a SAML provider with IAM.
  • D. Create a SAML provider with Amazon Cloud Directory.
  • E. Configure AWS as a trusted relying party for the Active Directory
  • F. Configure IAM as a trusted relying party for Amazon Cloud Directory.


Answer : ACE

Reference:
https://aws.amazon.com/blogs/security/aws-federated-authentication-with-active-directory-federation-services-ad-fs/

Page:    1 / 17   
Total 243 questions