{"id":4327,"date":"2019-08-29T01:53:09","date_gmt":"2019-08-29T01:53:09","guid":{"rendered":"https:\/\/www.dumpsbase.com\/freedumps\/?p=4327"},"modified":"2019-08-29T01:53:13","modified_gmt":"2019-08-29T01:53:13","slug":"aws-certified-security-specialty-scs-c01-exam-dumps","status":"publish","type":"post","link":"https:\/\/www.dumpsbase.com\/freedumps\/aws-certified-security-specialty-scs-c01-exam-dumps.html","title":{"rendered":"AWS Certified Security &#8211; Specialty SCS-C01 Exam Dumps"},"content":{"rendered":"\n<p>AWS Certification helps learners build credibility and confidence by validating their cloud expertise with an industry-recognized credential and organizations identify skilled professionals to lead cloud initiatives using AWS. SCS-C01 AWS Certified Security &#8211; Specialty exam is a hot AWS certification exam, which is intended for individuals who perform a security role with at least two years of hands-on experience securing AWS workloads.<\/p>\n<h2>There are some <span style=\"color: #800000;\">free SCS-C01 exam questions<\/span> for reading:<\/h2>\n<script>\n  window.fbAsyncInit = function() {\n    FB.init({\n      appId            : '622169541470367',\n      autoLogAppEvents : true,\n      xfbml            : true,\n      version          : 'v3.1'\n    });\n  };\n\n  (function(d, s, id){\n     var js, fjs = d.getElementsByTagName(s)[0];\n     if (d.getElementById(id)) {return;}\n     js = d.createElement(s); js.id = id;\n     js.src = \"https:\/\/connect.facebook.net\/en_US\/sdk.js\";\n     fjs.parentNode.insertBefore(js, fjs);\n   }(document, 'script', 'facebook-jssdk'));\n<\/script><div id=\"watu_quiz\" class=\"quiz-area single-page-quiz\">\n<p><\/p><form action=\"\" method=\"post\" class=\"quiz-form \" id=\"quiz-1809\" >\n<div class='watu-question' id='question-1'><div class='question-content'><p><span class='watu_num'>1. <\/span>The Security team believes that a former employee may have gained unauthorized access to AWS resources sometime in the past 3 months by using an identified access key.<br \/>\n<br \/>What approach would enable the Security team to find out what the former employee may have done within AWS?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104822' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434710' \/><div class='watu-question-choice'><input type='radio' name='answer-104822[]' id='answer-id-434710' class='answer answer-1  answerof-104822' value='434710' \/>&nbsp;<label for='answer-id-434710' id='answer-label-434710' class=' answer label-1'><span class='answer'>Use the AWS CloudTrail console to search for user activity.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434711' \/><div class='watu-question-choice'><input type='radio' name='answer-104822[]' id='answer-id-434711' class='answer answer-1  answerof-104822' value='434711' \/>&nbsp;<label for='answer-id-434711' id='answer-label-434711' class=' answer label-1'><span class='answer'>Use the Amazon CloudWatch Logs console to filter CloudTrail data by user.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434712' \/><div class='watu-question-choice'><input type='radio' name='answer-104822[]' id='answer-id-434712' class='answer answer-1  answerof-104822' value='434712' \/>&nbsp;<label for='answer-id-434712' id='answer-label-434712' class=' answer label-1'><span class='answer'>Use AWS Config to see what actions were taken by the user.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434713' \/><div class='watu-question-choice'><input type='radio' name='answer-104822[]' id='answer-id-434713' class='answer answer-1  answerof-104822' value='434713' \/>&nbsp;<label for='answer-id-434713' id='answer-label-434713' class=' answer label-1'><span class='answer'>Use Amazon Athena to query CloudTrail logs stored in Amazon S3.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType1' value='radio' class=''><\/div><div class='watu-question' id='question-2'><div class='question-content'><p><span class='watu_num'>2. <\/span>The Security Engineer implemented a new vault lock policy for 10TB of data and called initiate&shy;vault-lock12 hours ago. The Audit team identified a typo that is allowing incorrect access to the vault.<br \/>\n<br \/>What is the MOST cost-effective way to correct this?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104823' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434714' \/><div class='watu-question-choice'><input type='radio' name='answer-104823[]' id='answer-id-434714' class='answer answer-2  answerof-104823' value='434714' \/>&nbsp;<label for='answer-id-434714' id='answer-label-434714' class=' answer label-2'><span class='answer'>Call the abort-vault-lock operation, fix the typo, and call the initiate-vault-lockagain.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434715' \/><div class='watu-question-choice'><input type='radio' name='answer-104823[]' id='answer-id-434715' class='answer answer-2  answerof-104823' value='434715' \/>&nbsp;<label for='answer-id-434715' id='answer-label-434715' class=' answer label-2'><span class='answer'>Copy the vault data to Amazon S3, delete the vault, and create a new vault with the data.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434716' \/><div class='watu-question-choice'><input type='radio' name='answer-104823[]' id='answer-id-434716' class='answer answer-2  answerof-104823' value='434716' \/>&nbsp;<label for='answer-id-434716' id='answer-label-434716' class=' answer label-2'><span class='answer'>Update the policy, keeping the vault lock in place.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434717' \/><div class='watu-question-choice'><input type='radio' name='answer-104823[]' id='answer-id-434717' class='answer answer-2  answerof-104823' value='434717' \/>&nbsp;<label for='answer-id-434717' id='answer-label-434717' class=' answer label-2'><span class='answer'>Update the policy and call initiate-vault-lock again to apply the new policy.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType2' value='radio' class=''><\/div><div class='watu-question' id='question-3'><div class='question-content'><p><span class='watu_num'>3. <\/span>A company wants to control access to its AWS resources by using identities and groups that are defined in its existing Microsoft Active Directory.<br \/>\n<br \/>What must the company create in its AWS account to map permissions for AWS services to Active Directory user attributes?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104824' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434718' \/><div class='watu-question-choice'><input type='radio' name='answer-104824[]' id='answer-id-434718' class='answer answer-3  answerof-104824' value='434718' \/>&nbsp;<label for='answer-id-434718' id='answer-label-434718' class=' answer label-3'><span class='answer'>AWS IAM groups<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434719' \/><div class='watu-question-choice'><input type='radio' name='answer-104824[]' id='answer-id-434719' class='answer answer-3  answerof-104824' value='434719' \/>&nbsp;<label for='answer-id-434719' id='answer-label-434719' class=' answer label-3'><span class='answer'>AWS IAM users<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434720' \/><div class='watu-question-choice'><input type='radio' name='answer-104824[]' id='answer-id-434720' class='answer answer-3  answerof-104824' value='434720' \/>&nbsp;<label for='answer-id-434720' id='answer-label-434720' class=' answer label-3'><span class='answer'>AWS IAM roles<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434721' \/><div class='watu-question-choice'><input type='radio' name='answer-104824[]' id='answer-id-434721' class='answer answer-3  answerof-104824' value='434721' \/>&nbsp;<label for='answer-id-434721' id='answer-label-434721' class=' answer label-3'><span class='answer'>AWS IAM access keys<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType3' value='radio' class=''><\/div><div class='watu-question' id='question-4'><div class='question-content'><p><span class='watu_num'>4. <\/span>A company has contracted with a third party to audit several AWS accounts. To enable the audit, cross-account IAM roles have been created in each account targeted for audit. The Auditor is having trouble accessing some of the accounts.<br \/>\n<br \/>Which of the following may be causing this problem? (Choose three.)<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104825' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434722' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104825[]' id='answer-id-434722' class='answer answer-4  answerof-104825' value='434722' \/>&nbsp;<label for='answer-id-434722' id='answer-label-434722' class=' answer label-4'><span class='answer'>The external ID used by the Auditor is missing or incorrect.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434723' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104825[]' id='answer-id-434723' class='answer answer-4  answerof-104825' value='434723' \/>&nbsp;<label for='answer-id-434723' id='answer-label-434723' class=' answer label-4'><span class='answer'>The Auditor is using the incorrect password.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434724' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104825[]' id='answer-id-434724' class='answer answer-4  answerof-104825' value='434724' \/>&nbsp;<label for='answer-id-434724' id='answer-label-434724' class=' answer label-4'><span class='answer'>The Auditor has not been granted sts:AssumeRolefor the role in the destination account.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434725' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104825[]' id='answer-id-434725' class='answer answer-4  answerof-104825' value='434725' \/>&nbsp;<label for='answer-id-434725' id='answer-label-434725' class=' answer label-4'><span class='answer'>The Amazon EC2 role used by the Auditor must be set to the destination account role.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434726' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104825[]' id='answer-id-434726' class='answer answer-4  answerof-104825' value='434726' \/>&nbsp;<label for='answer-id-434726' id='answer-label-434726' class=' answer label-4'><span class='answer'>The secret key used by the Auditor is missing or incorrect.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434727' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104825[]' id='answer-id-434727' class='answer answer-4  answerof-104825' value='434727' \/>&nbsp;<label for='answer-id-434727' id='answer-label-434727' class=' answer label-4'><span class='answer'>The role ARN used by the Auditor is missing or incorrect.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType4' value='checkbox' class=''><\/div><div class='watu-question' id='question-5'><div class='question-content'><p><span class='watu_num'>5. <\/span>Compliance requirements state that all communications between company on-premises hosts and EC2 instances be encrypted in transit. Hosts use custom proprietary protocols for their communication, and EC2 instances need to be fronted by a load balancer for increased availability.<br \/>\n<br \/>Which of the following solutions will meet these requirements?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104826' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434728' \/><div class='watu-question-choice'><input type='radio' name='answer-104826[]' id='answer-id-434728' class='answer answer-5  answerof-104826' value='434728' \/>&nbsp;<label for='answer-id-434728' id='answer-label-434728' class=' answer label-5'><span class='answer'>Offload SSL termination onto an SSL listener on a Classic Load Balancer, and use a TCP connection between the load balancer and the EC2 instances.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434729' \/><div class='watu-question-choice'><input type='radio' name='answer-104826[]' id='answer-id-434729' class='answer answer-5  answerof-104826' value='434729' \/>&nbsp;<label for='answer-id-434729' id='answer-label-434729' class=' answer label-5'><span class='answer'>Route all traffic throughout a TCP listener on a Classic Load Balancer, and terminate the TLS connection on the EC2 instances.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434730' \/><div class='watu-question-choice'><input type='radio' name='answer-104826[]' id='answer-id-434730' class='answer answer-5  answerof-104826' value='434730' \/>&nbsp;<label for='answer-id-434730' id='answer-label-434730' class=' answer label-5'><span class='answer'>Create an HTTPS listener using an Application Load Balancer, and route all of the communication through that load balancer.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434731' \/><div class='watu-question-choice'><input type='radio' name='answer-104826[]' id='answer-id-434731' class='answer answer-5  answerof-104826' value='434731' \/>&nbsp;<label for='answer-id-434731' id='answer-label-434731' class=' answer label-5'><span class='answer'>Offload SSL termination onto an SSL listener using an Application Load Balancer, and re-spawn and SSL connection between the load balancer and the EC2 instances.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType5' value='radio' class=''><\/div><div class='watu-question' id='question-6'><div class='question-content'><p><span class='watu_num'>6. <\/span>An application is currently secured using network access control lists and security groups. Web servers are located in public subnets behind an Application Load Balancer (ALB); application servers are located in private subnets.<br \/>\n<br \/>How can edge security be enhanced to safeguard the Amazon EC2 instances against attack? (Choose two.)<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104827' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434732' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104827[]' id='answer-id-434732' class='answer answer-6  answerof-104827' value='434732' \/>&nbsp;<label for='answer-id-434732' id='answer-label-434732' class=' answer label-6'><span class='answer'>Configure the application\u2019s EC2 instances to use NAT gateways for all inbound traffic.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434733' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104827[]' id='answer-id-434733' class='answer answer-6  answerof-104827' value='434733' \/>&nbsp;<label for='answer-id-434733' id='answer-label-434733' class=' answer label-6'><span class='answer'>Move the web servers to private subnets without public IP addresses.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434734' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104827[]' id='answer-id-434734' class='answer answer-6  answerof-104827' value='434734' \/>&nbsp;<label for='answer-id-434734' id='answer-label-434734' class=' answer label-6'><span class='answer'>Configure AWS WAF to provide DDoS attack protection for the AL<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434735' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104827[]' id='answer-id-434735' class='answer answer-6  answerof-104827' value='434735' \/>&nbsp;<label for='answer-id-434735' id='answer-label-434735' class=' answer label-6'><span class='answer'>Require all inbound network traffic to route through a bastion host in the private subnet.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434736' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104827[]' id='answer-id-434736' class='answer answer-6  answerof-104827' value='434736' \/>&nbsp;<label for='answer-id-434736' id='answer-label-434736' class=' answer label-6'><span class='answer'>Require all inbound and outbound network traffic to route through an AWS Direct Connect connection.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType6' value='checkbox' class=''><\/div><div class='watu-question' id='question-7'><div class='question-content'><p><span class='watu_num'>7. <\/span>A Security Administrator is restricting the capabilities of company root user accounts. The company uses AWS Organizations and has enabled it for all feature sets, including consolidated billing. The top-level account is used for billing and administrative purposes, not for operational AWS resource purposes.<br \/>\n<br \/>How can the Administrator restrict usage of member root user accounts across the organization?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104828' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434737' \/><div class='watu-question-choice'><input type='radio' name='answer-104828[]' id='answer-id-434737' class='answer answer-7  answerof-104828' value='434737' \/>&nbsp;<label for='answer-id-434737' id='answer-label-434737' class=' answer label-7'><span class='answer'>Disable the use of the root user account at the organizational root. Enable multi-factor authentication of the root user account for each organizational member account.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434738' \/><div class='watu-question-choice'><input type='radio' name='answer-104828[]' id='answer-id-434738' class='answer answer-7  answerof-104828' value='434738' \/>&nbsp;<label for='answer-id-434738' id='answer-label-434738' class=' answer label-7'><span class='answer'>Configure IAM user policies to restrict root account capabilities for each Organizations member account.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434739' \/><div class='watu-question-choice'><input type='radio' name='answer-104828[]' id='answer-id-434739' class='answer answer-7  answerof-104828' value='434739' \/>&nbsp;<label for='answer-id-434739' id='answer-label-434739' class=' answer label-7'><span class='answer'>Create an organizational unit (OU) in Organizations with a service control policy that controls usage of the root user. Add all operational accounts to the new O<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434740' \/><div class='watu-question-choice'><input type='radio' name='answer-104828[]' id='answer-id-434740' class='answer answer-7  answerof-104828' value='434740' \/>&nbsp;<label for='answer-id-434740' id='answer-label-434740' class=' answer label-7'><span class='answer'>Configure AWS CloudTrail to integrate with Amazon CloudWatch Logs and then create a metric filter for RootAccountUsage.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType7' value='radio' class=''><\/div><div class='watu-question' id='question-8'><div class='question-content'><p><span class='watu_num'>8. <\/span>A Systems Engineer has been tasked with configuring outbound mail through Simple Email Service (SES) and requires compliance with current TLS standards.<br \/>\n<br \/>The mail application should be configured to connect to which of the following endpoints and corresponding ports?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104829' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434741' \/><div class='watu-question-choice'><input type='radio' name='answer-104829[]' id='answer-id-434741' class='answer answer-8  answerof-104829' value='434741' \/>&nbsp;<label for='answer-id-434741' id='answer-label-434741' class=' answer label-8'><span class='answer'>email.us-east-1.amazonaws.com over port 8080<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434742' \/><div class='watu-question-choice'><input type='radio' name='answer-104829[]' id='answer-id-434742' class='answer answer-8  answerof-104829' value='434742' \/>&nbsp;<label for='answer-id-434742' id='answer-label-434742' class=' answer label-8'><span class='answer'>email-pop3.us-east-1.amazonaws.com over port 995<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434743' \/><div class='watu-question-choice'><input type='radio' name='answer-104829[]' id='answer-id-434743' class='answer answer-8  answerof-104829' value='434743' \/>&nbsp;<label for='answer-id-434743' id='answer-label-434743' class=' answer label-8'><span class='answer'>email-smtp.us-east-1.amazonaws.com over port 587<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434744' \/><div class='watu-question-choice'><input type='radio' name='answer-104829[]' id='answer-id-434744' class='answer answer-8  answerof-104829' value='434744' \/>&nbsp;<label for='answer-id-434744' id='answer-label-434744' class=' answer label-8'><span class='answer'>email-imap.us-east-1.amazonaws.com over port 993<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType8' value='radio' class=''><\/div><div class='watu-question' id='question-9'><div class='question-content'><p><span class='watu_num'>9. <\/span>A threat assessment has identified a risk whereby an internal employee could exfiltrate sensitive data from production host running inside AWS (Account 1). The threat was documented as follows:<br \/>\n<br \/>Threat description: A malicious actor could upload sensitive data from Server X by configuring credentials for an AWS account (Account 2) they control and uploading data to an Amazon S3 bucket within their control.<br \/>\n<br \/>Server X has outbound internet access configured via a proxy server. Legitimate access to S3 is required so that the application can upload encrypted files to an S3 bucket. Server X is currently using an IAM instance role. The proxy server is not able to inspect any of the server communication due to TLS encryption.<br \/>\n<br \/>Which of the following options will mitigate the threat? (Choose two.)<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104830' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434745' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104830[]' id='answer-id-434745' class='answer answer-9  answerof-104830' value='434745' \/>&nbsp;<label for='answer-id-434745' id='answer-label-434745' class=' answer label-9'><span class='answer'>Bypass the proxy and use an S3 VPC endpoint with a policy that whitelists only certain S3 buckets within Account 1.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434746' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104830[]' id='answer-id-434746' class='answer answer-9  answerof-104830' value='434746' \/>&nbsp;<label for='answer-id-434746' id='answer-label-434746' class=' answer label-9'><span class='answer'>Block outbound access to public S3 endpoints on the proxy server.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434747' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104830[]' id='answer-id-434747' class='answer answer-9  answerof-104830' value='434747' \/>&nbsp;<label for='answer-id-434747' id='answer-label-434747' class=' answer label-9'><span class='answer'>Configure Network ACLs on Server X to deny access to S3 endpoints.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434748' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104830[]' id='answer-id-434748' class='answer answer-9  answerof-104830' value='434748' \/>&nbsp;<label for='answer-id-434748' id='answer-label-434748' class=' answer label-9'><span class='answer'>Modify the S3 bucket policy for the legitimate bucket to allow access only from the public IP addresses associated with the application server.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434749' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104830[]' id='answer-id-434749' class='answer answer-9  answerof-104830' value='434749' \/>&nbsp;<label for='answer-id-434749' id='answer-label-434749' class=' answer label-9'><span class='answer'>Remove the IAM instance role from the application server and save API access keys in a trusted and encrypted application config file.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType9' value='checkbox' class=''><\/div><div class='watu-question' id='question-10'><div class='question-content'><p><span class='watu_num'>10. <\/span>A company will store sensitive documents in three Amazon S3 buckets based on a data classification scheme of \u201cSensitive,\u201d \u201cConfidential,\u201d and \u201cRestricted.\u201d The security solution must meet all of the following requirements: <\/p>\n<p><img decoding=\"async\" width=9 height=7 src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2018\/exams\/SCS-C01%20V8.files\/image003.jpg\" v:shapes=\"\u56fe\u7247_x0020_21\"><br \/>Each object must be encrypted using a unique key.<br \/>\n<br \/>Items that are stored in the \u201cRestricted\u201d bucket require two-factor authentication for decryption.<br \/>\n<br \/>AWS KMS must automatically rotate encryption keys annually.<br \/>\n<br \/>Which of the following meets these requirements?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104831' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434750' \/><div class='watu-question-choice'><input type='radio' name='answer-104831[]' id='answer-id-434750' class='answer answer-10  answerof-104831' value='434750' \/>&nbsp;<label for='answer-id-434750' id='answer-label-434750' class=' answer label-10'><span class='answer'>Create a Customer Master Key (CMK) for each data classification type, and enable the rotation of it annually. For the \u201cRestricted\u201d CMK, define the MFA policy within the key policy. Use S3 SSE-KMS to encrypt the objects.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434751' \/><div class='watu-question-choice'><input type='radio' name='answer-104831[]' id='answer-id-434751' class='answer answer-10  answerof-104831' value='434751' \/>&nbsp;<label for='answer-id-434751' id='answer-label-434751' class=' answer label-10'><span class='answer'>Create a CMK grant for each data classification type with EnableKeyRotation and MultiFactorAuthPresent set to true. S3 can then use the grants to encrypt each object with a unique CM<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434752' \/><div class='watu-question-choice'><input type='radio' name='answer-104831[]' id='answer-id-434752' class='answer answer-10  answerof-104831' value='434752' \/>&nbsp;<label for='answer-id-434752' id='answer-label-434752' class=' answer label-10'><span class='answer'>Create a CMK for each data classification type, and within the CMK policy, enable rotation of it annually, and define the MFA policy. S3 can then create DEK grants to uniquely encrypt each object within the S3 bucket.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434753' \/><div class='watu-question-choice'><input type='radio' name='answer-104831[]' id='answer-id-434753' class='answer answer-10  answerof-104831' value='434753' \/>&nbsp;<label for='answer-id-434753' id='answer-label-434753' class=' answer label-10'><span class='answer'>Create a CMK with unique imported key material for each data classification type, and rotate them annually. For the \u201cRestricted\u201d key material, define the MFA policy in the key policy. Use S3 SSE-KMS to encrypt the objects.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType10' value='radio' class=''><\/div><div class='watu-question' id='question-11'><div class='question-content'><p><span class='watu_num'>11. <\/span>An organization wants to deploy a three-tier web application whereby the application servers run on Amazon EC2 instances. These EC2 instances need access to credentials that they will use to authenticate their SQL connections to an Amazon RDS DB instance. Also, AWS Lambda functions must issue queries to the RDS database by using the same database credentials.<br \/>\n<br \/>The credentials must be stored so that the EC2 instances and the Lambda functions can access them. No other access is allowed. The access logs must record when the credentials were accessed and by whom.<br \/>\n<br \/>What should the Security Engineer do to meet these requirements?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104832' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434754' \/><div class='watu-question-choice'><input type='radio' name='answer-104832[]' id='answer-id-434754' class='answer answer-11  answerof-104832' value='434754' \/>&nbsp;<label for='answer-id-434754' id='answer-label-434754' class=' answer label-11'><span class='answer'>Store the database credentials in AWS Key Management Service (AWS KMS). Create an IAM role with access to AWS KMS by using the EC2 and Lambda service principals in the role\u2019s trust policy. Add the role to an EC2 instance profile. Attach the instance profile to the EC2 instances. Set up Lambda to use<br \/>\nthe new role for execution.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434755' \/><div class='watu-question-choice'><input type='radio' name='answer-104832[]' id='answer-id-434755' class='answer answer-11  answerof-104832' value='434755' \/>&nbsp;<label for='answer-id-434755' id='answer-label-434755' class=' answer label-11'><span class='answer'>Store the database credentials in AWS KM<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434756' \/><div class='watu-question-choice'><input type='radio' name='answer-104832[]' id='answer-id-434756' class='answer answer-11  answerof-104832' value='434756' \/>&nbsp;<label for='answer-id-434756' id='answer-label-434756' class=' answer label-11'><span class='answer'>Create an IAM role with access to KMS by using the EC2 and Lambda service principals in the role\u2019s trust policy. Add the role to an EC2 instance profile. Attach the instance profile to the EC2 instances and the Lambda function.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434757' \/><div class='watu-question-choice'><input type='radio' name='answer-104832[]' id='answer-id-434757' class='answer answer-11  answerof-104832' value='434757' \/>&nbsp;<label for='answer-id-434757' id='answer-label-434757' class=' answer label-11'><span class='answer'>Store the database credentials in AWS Secrets Manager. Create an IAM role with access to Secrets Manager by using the EC2 and Lambda service principals in the role\u2019s trust policy. Add the role to an EC2 instance profile. Attach the instance profile to the EC2 instances and the Lambda function.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434758' \/><div class='watu-question-choice'><input type='radio' name='answer-104832[]' id='answer-id-434758' class='answer answer-11  answerof-104832' value='434758' \/>&nbsp;<label for='answer-id-434758' id='answer-label-434758' class=' answer label-11'><span class='answer'>Store the database credentials in AWS Secrets Manager. Create an IAM role with access to Secrets Manager by using the EC2 and Lambda service principals in the role\u2019s trust policy. Add the role to an EC2 instance profile. Attach the instance profile to the EC2 instances. Set up Lambda to use the new role for execution.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType11' value='radio' class=''><\/div><div class='watu-question' id='question-12'><div class='question-content'><p><span class='watu_num'>12. <\/span>A company has a customer master key (CMK) with imported key materials. Company policy requires that all encryption keys must be rotated every year.<br \/>\n<br \/>What can be done to implement the above policy?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104833' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434759' \/><div class='watu-question-choice'><input type='radio' name='answer-104833[]' id='answer-id-434759' class='answer answer-12  answerof-104833' value='434759' \/>&nbsp;<label for='answer-id-434759' id='answer-label-434759' class=' answer label-12'><span class='answer'>Enable automatic key rotation annually for the CM<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434760' \/><div class='watu-question-choice'><input type='radio' name='answer-104833[]' id='answer-id-434760' class='answer answer-12  answerof-104833' value='434760' \/>&nbsp;<label for='answer-id-434760' id='answer-label-434760' class=' answer label-12'><span class='answer'>Use AWS Command Line interface to create an AWS Lambda function to rotate the existing CMK annually.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434761' \/><div class='watu-question-choice'><input type='radio' name='answer-104833[]' id='answer-id-434761' class='answer answer-12  answerof-104833' value='434761' \/>&nbsp;<label for='answer-id-434761' id='answer-label-434761' class=' answer label-12'><span class='answer'>Import new key material to the existing CMK and manually rotate the CM<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434762' \/><div class='watu-question-choice'><input type='radio' name='answer-104833[]' id='answer-id-434762' class='answer answer-12  answerof-104833' value='434762' \/>&nbsp;<label for='answer-id-434762' id='answer-label-434762' class=' answer label-12'><span class='answer'>Create a new CMK, import new key material to it, and point the key alias to the new CM<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType12' value='radio' class=''><\/div><div class='watu-question' id='question-13'><div class='question-content'><p><span class='watu_num'>13. <\/span>A water utility company uses a number of Amazon EC2 instances to manage updates to a fleet of 2,000 Internet of Things (IoT) field devices that monitor water quality. These devices each have unique access credentials.<br \/>\n<br \/>An operational safety policy requires that access to specific credentials is independently auditable.<br \/>\n<br \/>What is the MOST cost-effective way to manage the storage of credentials?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104834' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434763' \/><div class='watu-question-choice'><input type='radio' name='answer-104834[]' id='answer-id-434763' class='answer answer-13  answerof-104834' value='434763' \/>&nbsp;<label for='answer-id-434763' id='answer-label-434763' class=' answer label-13'><span class='answer'>Use AWS Systems Manager to store the credentials as Secure Strings Parameters. Secure by using an AWS KMS key.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434764' \/><div class='watu-question-choice'><input type='radio' name='answer-104834[]' id='answer-id-434764' class='answer answer-13  answerof-104834' value='434764' \/>&nbsp;<label for='answer-id-434764' id='answer-label-434764' class=' answer label-13'><span class='answer'>Use AWS Key Management System to store a master key, which is used to encrypt the credentials. The encrypted credentials are stored in an Amazon RDS instance.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434765' \/><div class='watu-question-choice'><input type='radio' name='answer-104834[]' id='answer-id-434765' class='answer answer-13  answerof-104834' value='434765' \/>&nbsp;<label for='answer-id-434765' id='answer-label-434765' class=' answer label-13'><span class='answer'>Use AWS Secrets Manager to store the credentials.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434766' \/><div class='watu-question-choice'><input type='radio' name='answer-104834[]' id='answer-id-434766' class='answer answer-13  answerof-104834' value='434766' \/>&nbsp;<label for='answer-id-434766' id='answer-label-434766' class=' answer label-13'><span class='answer'>Store the credentials in a JSON file on Amazon S3 with server-side encryption.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType13' value='radio' class=''><\/div><div class='watu-question' id='question-14'><div class='question-content'><p><span class='watu_num'>14. <\/span>An organization is using Amazon CloudWatch Logs with agents deployed on its Linux Amazon EC2 instances. The agent configuration files have been checked and the application log files to be pushed are configured correctly. A review has identified that logging from specific instances is missing.<br \/>\n<br \/>Which steps should be taken to troubleshoot the issue? (Choose two.)<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104835' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434767' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104835[]' id='answer-id-434767' class='answer answer-14  answerof-104835' value='434767' \/>&nbsp;<label for='answer-id-434767' id='answer-label-434767' class=' answer label-14'><span class='answer'>Use an EC2 run command to confirm that the \u201cawslogs\u201d service is running on all instances.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434768' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104835[]' id='answer-id-434768' class='answer answer-14  answerof-104835' value='434768' \/>&nbsp;<label for='answer-id-434768' id='answer-label-434768' class=' answer label-14'><span class='answer'>Verify that the permissions used by the agent allow creation of log groups\/streams and to put log events.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434769' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104835[]' id='answer-id-434769' class='answer answer-14  answerof-104835' value='434769' \/>&nbsp;<label for='answer-id-434769' id='answer-label-434769' class=' answer label-14'><span class='answer'>Check whether any application log entries were rejected because of invalid time stamps by reviewing \/ var\/cwlogs\/rejects.log.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434770' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104835[]' id='answer-id-434770' class='answer answer-14  answerof-104835' value='434770' \/>&nbsp;<label for='answer-id-434770' id='answer-label-434770' class=' answer label-14'><span class='answer'>Check that the trust relationship grants the service \u201ccwlogs.amazonaws.com\u201d permission to write objects to the Amazon S3 staging bucket.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434771' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104835[]' id='answer-id-434771' class='answer answer-14  answerof-104835' value='434771' \/>&nbsp;<label for='answer-id-434771' id='answer-label-434771' class=' answer label-14'><span class='answer'>Verify that the time zone on the application servers is in UT<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType14' value='checkbox' class=''><\/div><div class='watu-question' id='question-15'><div class='question-content'><p><span class='watu_num'>15. <\/span>A Security Engineer must design a solution that enables the incident Response team to audit for changes to a user\u2019s IAM permissions in the case of a security incident.<br \/>\n<br \/>How can this be accomplished?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104836' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434772' \/><div class='watu-question-choice'><input type='radio' name='answer-104836[]' id='answer-id-434772' class='answer answer-15  answerof-104836' value='434772' \/>&nbsp;<label for='answer-id-434772' id='answer-label-434772' class=' answer label-15'><span class='answer'>Use AWS Config to review the IAM policy assigned to users before and after the incident.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434773' \/><div class='watu-question-choice'><input type='radio' name='answer-104836[]' id='answer-id-434773' class='answer answer-15  answerof-104836' value='434773' \/>&nbsp;<label for='answer-id-434773' id='answer-label-434773' class=' answer label-15'><span class='answer'>Run the GenerateCredentialReport via the AWS CLI, and copy the output to Amazon S3 daily for auditing purposes.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434774' \/><div class='watu-question-choice'><input type='radio' name='answer-104836[]' id='answer-id-434774' class='answer answer-15  answerof-104836' value='434774' \/>&nbsp;<label for='answer-id-434774' id='answer-label-434774' class=' answer label-15'><span class='answer'>Copy AWS CloudFormation templates to S3, and audit for changes from the template.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434775' \/><div class='watu-question-choice'><input type='radio' name='answer-104836[]' id='answer-id-434775' class='answer answer-15  answerof-104836' value='434775' \/>&nbsp;<label for='answer-id-434775' id='answer-label-434775' class=' answer label-15'><span class='answer'>Use Amazon EC2 Systems Manager to deploy images, and review AWS CloudTrail logs for changes.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType15' value='radio' class=''><\/div><div class='watu-question' id='question-16'><div class='question-content'><p><span class='watu_num'>16. <\/span>A company has complex connectivity rules governing ingress, egress, and communications between Amazon EC2 instances. The rules are so complex that they cannot be implemented within the limits of the maximum number of security groups and network access control lists (network ACLs).<br \/>\n<br \/>What mechanism will allow the company to implement all required network rules without incurring additional cost?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104837' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434776' \/><div class='watu-question-choice'><input type='radio' name='answer-104837[]' id='answer-id-434776' class='answer answer-16  answerof-104837' value='434776' \/>&nbsp;<label for='answer-id-434776' id='answer-label-434776' class=' answer label-16'><span class='answer'>Configure AWS WAF rules to implement the required rules.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434777' \/><div class='watu-question-choice'><input type='radio' name='answer-104837[]' id='answer-id-434777' class='answer answer-16  answerof-104837' value='434777' \/>&nbsp;<label for='answer-id-434777' id='answer-label-434777' class=' answer label-16'><span class='answer'>Use the operating system built-in, host-based firewall to implement the required rules.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434778' \/><div class='watu-question-choice'><input type='radio' name='answer-104837[]' id='answer-id-434778' class='answer answer-16  answerof-104837' value='434778' \/>&nbsp;<label for='answer-id-434778' id='answer-label-434778' class=' answer label-16'><span class='answer'>Use a NAT gateway to control ingress and egress according to the requirements.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434779' \/><div class='watu-question-choice'><input type='radio' name='answer-104837[]' id='answer-id-434779' class='answer answer-16  answerof-104837' value='434779' \/>&nbsp;<label for='answer-id-434779' id='answer-label-434779' class=' answer label-16'><span class='answer'>Launch an EC2-based firewall product from the AWS Marketplace, and implement the required rules in that product.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType16' value='radio' class=''><\/div><div class='watu-question' id='question-17'><div class='question-content'><p><span class='watu_num'>17. <\/span>An IAM user with fill EC2 permissions could bot start an Amazon EC2 instance after it was stopped for a maintenance task. Upon starting the instance, the instance state would change to \u201cPending\u201d, but after a few seconds, it would switch back to \u201cStopped\u201d.<br \/>\n<br \/>An inspection revealed that the instance has attached Amazon EBS volumes that were encrypted by using a Customer Master Key (CMK). When these encrypted volumes were detached, the IAM user was able to start the EC2 instances.<br \/>\n<br \/>The IAM user policy is as follows: <\/p>\n<p><img decoding=\"async\" width=547 height=313 src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2018\/exams\/SCS-C01%20V8.files\/image005.jpg\" v:shapes=\"_x0000_i1026\"><\/p>\n<p>What additional items need to be added to the IAM user policy? (Choose two.)<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104838' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434780' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104838[]' id='answer-id-434780' class='answer answer-17  answerof-104838' value='434780' \/>&nbsp;<label for='answer-id-434780' id='answer-label-434780' class=' answer label-17'><span class='answer'>kms:GenerateDataKey<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434781' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104838[]' id='answer-id-434781' class='answer answer-17  answerof-104838' value='434781' \/>&nbsp;<label for='answer-id-434781' id='answer-label-434781' class=' answer label-17'><span class='answer'>kms:Decrypt<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434782' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104838[]' id='answer-id-434782' class='answer answer-17  answerof-104838' value='434782' \/>&nbsp;<label for='answer-id-434782' id='answer-label-434782' class=' answer label-17'><span class='answer'>kms:CreateGrant<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434783' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104838[]' id='answer-id-434783' class='answer answer-17  answerof-104838' value='434783' \/>&nbsp;<label for='answer-id-434783' id='answer-label-434783' class=' answer label-17'><span class='answer'>\u201c Condition\u201d: {<br \/>\n\u201cBool\u201d: {<br \/>\n\u201ckms:ViaService\u201d: \u201cec2.us-west-2.amazonaws.com\u201d<br \/>\n}<br \/>\n}<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434784' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104838[]' id='answer-id-434784' class='answer answer-17  answerof-104838' value='434784' \/>&nbsp;<label for='answer-id-434784' id='answer-label-434784' class=' answer label-17'><span class='answer'>\u201cCondition\u201d: {<br \/>\n\u201cBool\u201d: {<br \/>\n\u201ckms:GrantIsForAWSResource\u201d: true<br \/>\n}<br \/>\n}<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType17' value='checkbox' class=''><\/div><div class='watu-question' id='question-18'><div class='question-content'><p><span class='watu_num'>18. <\/span>A Security Administrator has a website hosted in Amazon S3.<br \/>\n<br \/>The Administrator has been given the following requirements:<br \/>\n<br \/>&#8211; Users may access the website by using an Amazon CloudFront distribution.<br \/>\n<br \/>&#8211; Users may not access the website directly by using an Amazon S3 URL.<br \/>\n<br \/>Which configurations will support these requirements? (Choose two.)<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104839' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434785' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104839[]' id='answer-id-434785' class='answer answer-18  answerof-104839' value='434785' \/>&nbsp;<label for='answer-id-434785' id='answer-label-434785' class=' answer label-18'><span class='answer'>Associate an origin access identity with the CloudFront distribution.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434786' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104839[]' id='answer-id-434786' class='answer answer-18  answerof-104839' value='434786' \/>&nbsp;<label for='answer-id-434786' id='answer-label-434786' class=' answer label-18'><span class='answer'>Implement a \u201cPrincipal\u201d: \u201ccloudfront.amazonaws.com\u201d condition in the S3 bucket policy.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434787' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104839[]' id='answer-id-434787' class='answer answer-18  answerof-104839' value='434787' \/>&nbsp;<label for='answer-id-434787' id='answer-label-434787' class=' answer label-18'><span class='answer'>Modify the S3 bucket permissions so that only the origin access identity can access the bucket contents.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434788' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104839[]' id='answer-id-434788' class='answer answer-18  answerof-104839' value='434788' \/>&nbsp;<label for='answer-id-434788' id='answer-label-434788' class=' answer label-18'><span class='answer'>Implement security groups so that the S3 bucket can be accessed only by using the intended CloudFront distribution.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434789' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104839[]' id='answer-id-434789' class='answer answer-18  answerof-104839' value='434789' \/>&nbsp;<label for='answer-id-434789' id='answer-label-434789' class=' answer label-18'><span class='answer'>Configure the S3 bucket policy so that it is accessible only through VPC endpoints, and place the CloudFront distribution into the specified VP<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType18' value='checkbox' class=''><\/div><div class='watu-question' id='question-19'><div class='question-content'><p><span class='watu_num'>19. <\/span>A Security Engineer has created an Amazon CloudWatch event that invokes an AWS Lambda function daily. The Lambda function runs an Amazon Athena query that checks AWS CloudTrail logs in Amazon S3 to detect whether any IAM user accounts or credentials have been created in the past 30 days. The results of the Athena query are created in the same S3 bucket. The Engineer runs a test execution of the Lambda function via the AWS Console, and the function runs successfully.<br \/>\n<br \/>After several minutes, the Engineer finds that his Athena query has failed with the error message: \u201cInsufficient Permissions\u201d. The IAM permissions of the Security Engineer and the Lambda function are shown below:<br \/>\n<br \/>Security Engineer <\/p>\n<p><img decoding=\"async\" width=336 height=354 src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2018\/exams\/SCS-C01%20V8.files\/image007.jpg\" v:shapes=\"_x0000_i1027\"><\/p>\n<p>Lambda function execution role What is causing the error? <\/p>\n<p><img decoding=\"async\" width=328 height=253 src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2018\/exams\/SCS-C01%20V8.files\/image009.jpg\" v:shapes=\"_x0000_i1028\"><\/p>\n<p>What is causing the error?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104840' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434790' \/><div class='watu-question-choice'><input type='radio' name='answer-104840[]' id='answer-id-434790' class='answer answer-19  answerof-104840' value='434790' \/>&nbsp;<label for='answer-id-434790' id='answer-label-434790' class=' answer label-19'><span class='answer'>The Lambda function does not have permissions to start the Athena query execution.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434791' \/><div class='watu-question-choice'><input type='radio' name='answer-104840[]' id='answer-id-434791' class='answer answer-19  answerof-104840' value='434791' \/>&nbsp;<label for='answer-id-434791' id='answer-label-434791' class=' answer label-19'><span class='answer'>The Security Engineer does not have permissions to start the Athena query execution.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434792' \/><div class='watu-question-choice'><input type='radio' name='answer-104840[]' id='answer-id-434792' class='answer answer-19  answerof-104840' value='434792' \/>&nbsp;<label for='answer-id-434792' id='answer-label-434792' class=' answer label-19'><span class='answer'>The Athena service does not support invocation through Lambda.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434793' \/><div class='watu-question-choice'><input type='radio' name='answer-104840[]' id='answer-id-434793' class='answer answer-19  answerof-104840' value='434793' \/>&nbsp;<label for='answer-id-434793' id='answer-label-434793' class=' answer label-19'><span class='answer'>The Lambda function does not have permissions to access the CloudTrail S3 bucket.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType19' value='radio' class=''><\/div><div class='watu-question' id='question-20'><div class='question-content'><p><span class='watu_num'>20. <\/span>A company requires that IP packet data be inspected for invalid or malicious content.<br \/>\n<br \/>Which of the following approaches achieve this requirement? (Choose two.)<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104841' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434794' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104841[]' id='answer-id-434794' class='answer answer-20  answerof-104841' value='434794' \/>&nbsp;<label for='answer-id-434794' id='answer-label-434794' class=' answer label-20'><span class='answer'>Configure a proxy solution on Amazon EC2 and route all outbound VPC traffic through it. Perform inspection within proxy software on the EC2 instance.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434795' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104841[]' id='answer-id-434795' class='answer answer-20  answerof-104841' value='434795' \/>&nbsp;<label for='answer-id-434795' id='answer-label-434795' class=' answer label-20'><span class='answer'>Configure the host-based agent on each EC2 instance within the VP<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434796' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104841[]' id='answer-id-434796' class='answer answer-20  answerof-104841' value='434796' \/>&nbsp;<label for='answer-id-434796' id='answer-label-434796' class=' answer label-20'><span class='answer'>Perform inspection within the host-based agent.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434797' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104841[]' id='answer-id-434797' class='answer answer-20  answerof-104841' value='434797' \/>&nbsp;<label for='answer-id-434797' id='answer-label-434797' class=' answer label-20'><span class='answer'>Enable VPC Flow Logs for all subnets in the VP<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434798' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104841[]' id='answer-id-434798' class='answer answer-20  answerof-104841' value='434798' \/>&nbsp;<label for='answer-id-434798' id='answer-label-434798' class=' answer label-20'><span class='answer'>Perform inspection from the Flow Log data within Amazon CloudWatch Logs.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434799' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104841[]' id='answer-id-434799' class='answer answer-20  answerof-104841' value='434799' \/>&nbsp;<label for='answer-id-434799' id='answer-label-434799' class=' answer label-20'><span class='answer'>Configure Elastic Load Balancing (ELB) access logs. Perform inspection from the log data within the ELB access log files.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434800' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104841[]' id='answer-id-434800' class='answer answer-20  answerof-104841' value='434800' \/>&nbsp;<label for='answer-id-434800' id='answer-label-434800' class=' answer label-20'><span class='answer'>Configure the CloudWatch Logs agent on each EC2 instance within the VP<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434801' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104841[]' id='answer-id-434801' class='answer answer-20  answerof-104841' value='434801' \/>&nbsp;<label for='answer-id-434801' id='answer-label-434801' class=' answer label-20'><span class='answer'>Perform inspection from the log data within CloudWatch Logs.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType20' value='checkbox' class=''><\/div><div class='watu-question' id='question-21'><div class='question-content'><p><span class='watu_num'>21. <\/span>An organization has a system in AWS that allows a large number of remote workers to submit data files. File sizes vary from a few kilobytes to several megabytes. A recent audit highlighted a concern that data files are not encrypted while in transit over untrusted networks.<br \/>\n<br \/>Which solution would remediate the audit finding while minimizing the effort required?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104842' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434802' \/><div class='watu-question-choice'><input type='radio' name='answer-104842[]' id='answer-id-434802' class='answer answer-21  answerof-104842' value='434802' \/>&nbsp;<label for='answer-id-434802' id='answer-label-434802' class=' answer label-21'><span class='answer'>Upload an SSL certificate to IAM, and configure Amazon CloudFront with the passphrase for the private key.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434803' \/><div class='watu-question-choice'><input type='radio' name='answer-104842[]' id='answer-id-434803' class='answer answer-21  answerof-104842' value='434803' \/>&nbsp;<label for='answer-id-434803' id='answer-label-434803' class=' answer label-21'><span class='answer'>Call KM<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434804' \/><div class='watu-question-choice'><input type='radio' name='answer-104842[]' id='answer-id-434804' class='answer answer-21  answerof-104842' value='434804' \/>&nbsp;<label for='answer-id-434804' id='answer-label-434804' class=' answer label-21'><span class='answer'>Encrypt()in the client, passing in the data file contents, and call KM<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434805' \/><div class='watu-question-choice'><input type='radio' name='answer-104842[]' id='answer-id-434805' class='answer answer-21  answerof-104842' value='434805' \/>&nbsp;<label for='answer-id-434805' id='answer-label-434805' class=' answer label-21'><span class='answer'>Decrypt()server-side.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434806' \/><div class='watu-question-choice'><input type='radio' name='answer-104842[]' id='answer-id-434806' class='answer answer-21  answerof-104842' value='434806' \/>&nbsp;<label for='answer-id-434806' id='answer-label-434806' class=' answer label-21'><span class='answer'>Use AWS Certificate Manager to provision a certificate on an Elastic Load Balancing in front of the web service\u2019s servers.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434807' \/><div class='watu-question-choice'><input type='radio' name='answer-104842[]' id='answer-id-434807' class='answer answer-21  answerof-104842' value='434807' \/>&nbsp;<label for='answer-id-434807' id='answer-label-434807' class=' answer label-21'><span class='answer'>Create a new VPC with an Amazon VPC VPN endpoint, and update the web service\u2019s DNS record.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType21' value='radio' class=''><\/div><div class='watu-question' id='question-22'><div class='question-content'><p><span class='watu_num'>22. <\/span>Which option for the use of the AWS Key Management Service (KMS) supports key management best practices that focus on minimizing the potential scope of data exposed by a possible future key compromise?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104843' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434808' \/><div class='watu-question-choice'><input type='radio' name='answer-104843[]' id='answer-id-434808' class='answer answer-22  answerof-104843' value='434808' \/>&nbsp;<label for='answer-id-434808' id='answer-label-434808' class=' answer label-22'><span class='answer'>Use KMS automatic key rotation to replace the master key, and use this new master key for future encryption operations without re-encrypting previously encrypted data.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434809' \/><div class='watu-question-choice'><input type='radio' name='answer-104843[]' id='answer-id-434809' class='answer answer-22  answerof-104843' value='434809' \/>&nbsp;<label for='answer-id-434809' id='answer-label-434809' class=' answer label-22'><span class='answer'>Generate a new Customer Master Key (CMK), re-encrypt all existing data with the new CMK, and use it for all future encryption operations.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434810' \/><div class='watu-question-choice'><input type='radio' name='answer-104843[]' id='answer-id-434810' class='answer answer-22  answerof-104843' value='434810' \/>&nbsp;<label for='answer-id-434810' id='answer-label-434810' class=' answer label-22'><span class='answer'>Change the CMK alias every 90 days, and update key-calling applications with the new key alias.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434811' \/><div class='watu-question-choice'><input type='radio' name='answer-104843[]' id='answer-id-434811' class='answer answer-22  answerof-104843' value='434811' \/>&nbsp;<label for='answer-id-434811' id='answer-label-434811' class=' answer label-22'><span class='answer'>Change the CMK permissions to ensure that individuals who can provision keys are not the same individuals who can use the keys.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType22' value='radio' class=''><\/div><div class='watu-question' id='question-23'><div class='question-content'><p><span class='watu_num'>23. <\/span>A Security Engineer must enforce the use of only Amazon EC2, Amazon S3, Amazon RDS, Amazon DynamoDB, and AWS STS in specific accounts.<br \/>\n<br \/>What is a scalable and efficient approach to meet this requirement?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104844' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434812' \/><div class='watu-question-choice'><input type='radio' name='answer-104844[]' id='answer-id-434812' class='answer answer-23  answerof-104844' value='434812' \/>&nbsp;<label for='answer-id-434812' id='answer-label-434812' class=' answer label-23'><span class='answer'>Set up an AWS Organizations hierarchy, and replace the FullAWSAccess policy with the following Service Control Policy for the governed organization units:<br \/>\n<br \/><img decoding=\"async\" width=497 height=253 src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2018\/exams\/SCS-C01%20V8.files\/image011.jpg\" v:shapes=\"_x0000_i1029\"><br \/><\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434813' \/><div class='watu-question-choice'><input type='radio' name='answer-104844[]' id='answer-id-434813' class='answer answer-23  answerof-104844' value='434813' \/>&nbsp;<label for='answer-id-434813' id='answer-label-434813' class=' answer label-23'><span class='answer'>Create multiple IAM users for the regulated accounts, and attach the following policy statement to restrict services as required:<br \/>\n<br \/><img decoding=\"async\" width=495 height=362 src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2018\/exams\/SCS-C01%20V8.files\/image013.jpg\" v:shapes=\"_x0000_i1030\"><br \/><\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434814' \/><div class='watu-question-choice'><input type='radio' name='answer-104844[]' id='answer-id-434814' class='answer answer-23  answerof-104844' value='434814' \/>&nbsp;<label for='answer-id-434814' id='answer-label-434814' class=' answer label-23'><span class='answer'>Set up an Organizations hierarchy, replace the global FullAWSAccess with the following Service Control Policy at the top level:<br \/>\n<br \/><img decoding=\"async\" width=496 height=254 src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2018\/exams\/SCS-C01%20V8.files\/image015.jpg\" v:shapes=\"_x0000_i1031\"><br \/><\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434815' \/><div class='watu-question-choice'><input type='radio' name='answer-104844[]' id='answer-id-434815' class='answer answer-23  answerof-104844' value='434815' \/>&nbsp;<label for='answer-id-434815' id='answer-label-434815' class=' answer label-23'><span class='answer'>Set up all users in the Active Directory for federated access to all accounts in the company. Associate Active Directory groups with IAM groups, and attach the following policy statement to restrict services as required:<br \/>\n<br \/><img decoding=\"async\" width=496 height=362 src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2018\/exams\/SCS-C01%20V8.files\/image017.jpg\" v:shapes=\"_x0000_i1032\"><br \/><\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType23' value='radio' class=''><\/div><div class='watu-question' id='question-24'><div class='question-content'><p><span class='watu_num'>24. <\/span>A company\u2019s database developer has just migrated an Amazon RDS database credential to be stored and managed by AWS Secrets Manager. The developer has also enabled rotation of the credential within the Secrets Manager console and set the rotation to change every 30 days.<br \/>\n<br \/>After a short period of time, a number of existing applications have failed with authentication errors.<br \/>\n<br \/>What is the MOST likely cause of the authentication errors?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104845' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434816' \/><div class='watu-question-choice'><input type='radio' name='answer-104845[]' id='answer-id-434816' class='answer answer-24  answerof-104845' value='434816' \/>&nbsp;<label for='answer-id-434816' id='answer-label-434816' class=' answer label-24'><span class='answer'>Migrating the credential to RDS requires that all access come through requests to the Secrets Manager.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434817' \/><div class='watu-question-choice'><input type='radio' name='answer-104845[]' id='answer-id-434817' class='answer answer-24  answerof-104845' value='434817' \/>&nbsp;<label for='answer-id-434817' id='answer-label-434817' class=' answer label-24'><span class='answer'>Enabling rotation in Secrets Manager causes the secret to rotate immediately and the applications are using the earlier credential.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434818' \/><div class='watu-question-choice'><input type='radio' name='answer-104845[]' id='answer-id-434818' class='answer answer-24  answerof-104845' value='434818' \/>&nbsp;<label for='answer-id-434818' id='answer-label-434818' class=' answer label-24'><span class='answer'>The Secrets Manager IAM policy does not allow access to the RDS database.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434819' \/><div class='watu-question-choice'><input type='radio' name='answer-104845[]' id='answer-id-434819' class='answer answer-24  answerof-104845' value='434819' \/>&nbsp;<label for='answer-id-434819' id='answer-label-434819' class=' answer label-24'><span class='answer'>The Secrets Manager IAM policy does not allow access for the applications.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType24' value='radio' class=''><\/div><div class='watu-question' id='question-25'><div class='question-content'><p><span class='watu_num'>25. <\/span>A Security Engineer launches two Amazon EC2 instances in the same Amazon VPC but in separate Availability Zones. Each instance has a public IP address and is able to connect to external hosts on the internet. The two instances are able to communicate with each other by using their private IP addresses, but they are not able to communicate with each other when using their public IP addresses.<br \/>\n<br \/>Which action should the Security Engineer take to allow communication over the public IP addresses?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104846' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434820' \/><div class='watu-question-choice'><input type='radio' name='answer-104846[]' id='answer-id-434820' class='answer answer-25  answerof-104846' value='434820' \/>&nbsp;<label for='answer-id-434820' id='answer-label-434820' class=' answer label-25'><span class='answer'>Associate the instances to the same security groups.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434821' \/><div class='watu-question-choice'><input type='radio' name='answer-104846[]' id='answer-id-434821' class='answer answer-25  answerof-104846' value='434821' \/>&nbsp;<label for='answer-id-434821' id='answer-label-434821' class=' answer label-25'><span class='answer'>Add 0.0.0.0\/0 to the egress rules of the instance security groups.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434822' \/><div class='watu-question-choice'><input type='radio' name='answer-104846[]' id='answer-id-434822' class='answer answer-25  answerof-104846' value='434822' \/>&nbsp;<label for='answer-id-434822' id='answer-label-434822' class=' answer label-25'><span class='answer'>Add the instance IDs to the ingress rules of the instance security groups.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434823' \/><div class='watu-question-choice'><input type='radio' name='answer-104846[]' id='answer-id-434823' class='answer answer-25  answerof-104846' value='434823' \/>&nbsp;<label for='answer-id-434823' id='answer-label-434823' class=' answer label-25'><span class='answer'>Add the public IP addresses to the ingress rules of the instance security groups.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType25' value='radio' class=''><\/div><div class='watu-question' id='question-26'><div class='question-content'><p><span class='watu_num'>26. <\/span>The Security Engineer is managing a web application that processes highly sensitive personal information. The application runs on Amazon EC2. The application has strict compliance requirements, which instruct that all incoming traffic to the application is protected from common web exploits and that all outgoing traffic from the EC2 instances is restricted to specific whitelisted URLs.<br \/>\n<br \/>Which architecture should the Security Engineer use to meet these requirements?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104847' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434824' \/><div class='watu-question-choice'><input type='radio' name='answer-104847[]' id='answer-id-434824' class='answer answer-26  answerof-104847' value='434824' \/>&nbsp;<label for='answer-id-434824' id='answer-label-434824' class=' answer label-26'><span class='answer'>Use AWS Shield to scan inbound traffic for web exploits. Use VPC Flow Logs and AWS Lambda to restrict egress traffic to specific whitelisted URLs.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434825' \/><div class='watu-question-choice'><input type='radio' name='answer-104847[]' id='answer-id-434825' class='answer answer-26  answerof-104847' value='434825' \/>&nbsp;<label for='answer-id-434825' id='answer-label-434825' class=' answer label-26'><span class='answer'>Use AWS Shield to scan inbound traffic for web exploits. Use a third-party AWS Marketplace solution to restrict egress traffic to specific whitelisted URLs.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434826' \/><div class='watu-question-choice'><input type='radio' name='answer-104847[]' id='answer-id-434826' class='answer answer-26  answerof-104847' value='434826' \/>&nbsp;<label for='answer-id-434826' id='answer-label-434826' class=' answer label-26'><span class='answer'>Use AWS WAF to scan inbound traffic for web exploits. Use VPC Flow Logs and AWS Lambda to restrict egress traffic to specific whitelisted URLs.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434827' \/><div class='watu-question-choice'><input type='radio' name='answer-104847[]' id='answer-id-434827' class='answer answer-26  answerof-104847' value='434827' \/>&nbsp;<label for='answer-id-434827' id='answer-label-434827' class=' answer label-26'><span class='answer'>Use AWS WAF to scan inbound traffic for web exploits. Use a third-party AWS Marketplace solution to restrict egress traffic to specific whitelisted URLs.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType26' value='radio' class=''><\/div><div class='watu-question' id='question-27'><div class='question-content'><p><span class='watu_num'>27. <\/span>A company recently experienced a DDoS attack that prevented its web server from serving content. The website is static and hosts only HTML, CSS, and PDF files that users download.<br \/>\n<br \/>Based on the architecture shown in the image, what is the BEST way to protect the site against future attacks while minimizing the ongoing operational overhead? <\/p>\n<p><img decoding=\"async\" width=650 height=634 src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2018\/exams\/SCS-C01%20V8.files\/image019.jpg\" v:shapes=\"_x0000_i1033\"><\/p>\n<\/div><input type='hidden' name='question_id[]' value='104848' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434828' \/><div class='watu-question-choice'><input type='radio' name='answer-104848[]' id='answer-id-434828' class='answer answer-27  answerof-104848' value='434828' \/>&nbsp;<label for='answer-id-434828' id='answer-label-434828' class=' answer label-27'><span class='answer'>Move all the files to an Amazon S3 bucket. Have the web server serve the files from the S3 bucket.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434829' \/><div class='watu-question-choice'><input type='radio' name='answer-104848[]' id='answer-id-434829' class='answer answer-27  answerof-104848' value='434829' \/>&nbsp;<label for='answer-id-434829' id='answer-label-434829' class=' answer label-27'><span class='answer'>Launch a second Amazon EC2 instance in a new subnet. Launch an Application Load Balancer in front of both instances.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434830' \/><div class='watu-question-choice'><input type='radio' name='answer-104848[]' id='answer-id-434830' class='answer answer-27  answerof-104848' value='434830' \/>&nbsp;<label for='answer-id-434830' id='answer-label-434830' class=' answer label-27'><span class='answer'>Launch an Application Load Balancer in front of the EC2 instance. Create an Amazon CloudFront distribution in front of the Application Load Balancer.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434831' \/><div class='watu-question-choice'><input type='radio' name='answer-104848[]' id='answer-id-434831' class='answer answer-27  answerof-104848' value='434831' \/>&nbsp;<label for='answer-id-434831' id='answer-label-434831' class=' answer label-27'><span class='answer'>Move all the files to an Amazon S3 bucket. Create a CloudFront distribution in front of the bucket and terminate the web server.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType27' value='radio' class=''><\/div><div class='watu-question' id='question-28'><div class='question-content'><p><span class='watu_num'>28. <\/span>The Information Technology department has stopped using Classic Load Balancers and switched to Application Load Balancers to save costs. After the switch, some users on older devices are no longer able to connect to the website.<br \/>\n<br \/>What is causing this situation?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104849' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434832' \/><div class='watu-question-choice'><input type='radio' name='answer-104849[]' id='answer-id-434832' class='answer answer-28  answerof-104849' value='434832' \/>&nbsp;<label for='answer-id-434832' id='answer-label-434832' class=' answer label-28'><span class='answer'>Application Load Balancers do not support older web browsers.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434833' \/><div class='watu-question-choice'><input type='radio' name='answer-104849[]' id='answer-id-434833' class='answer answer-28  answerof-104849' value='434833' \/>&nbsp;<label for='answer-id-434833' id='answer-label-434833' class=' answer label-28'><span class='answer'>The Perfect Forward Secrecy settings are not configured correctly.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434834' \/><div class='watu-question-choice'><input type='radio' name='answer-104849[]' id='answer-id-434834' class='answer answer-28  answerof-104849' value='434834' \/>&nbsp;<label for='answer-id-434834' id='answer-label-434834' class=' answer label-28'><span class='answer'>The intermediate certificate is installed within the Application Load Balancer.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434835' \/><div class='watu-question-choice'><input type='radio' name='answer-104849[]' id='answer-id-434835' class='answer answer-28  answerof-104849' value='434835' \/>&nbsp;<label for='answer-id-434835' id='answer-label-434835' class=' answer label-28'><span class='answer'>The cipher suites on the Application Load Balancers are blocking connections.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType28' value='radio' class=''><\/div><div class='watu-question' id='question-29'><div class='question-content'><p><span class='watu_num'>29. <\/span>A security team is responsible for reviewing AWS API call activity in the cloud environment for security violations. These events must be recorded and retained in a centralized location for both current and future AWS regions.<br \/>\n<br \/>What is the SIMPLEST way to meet these requirements?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104850' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434836' \/><div class='watu-question-choice'><input type='radio' name='answer-104850[]' id='answer-id-434836' class='answer answer-29  answerof-104850' value='434836' \/>&nbsp;<label for='answer-id-434836' id='answer-label-434836' class=' answer label-29'><span class='answer'>Enable AWS Trusted Advisor security checks in the AWS Console, and report all security incidents for all regions.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434837' \/><div class='watu-question-choice'><input type='radio' name='answer-104850[]' id='answer-id-434837' class='answer answer-29  answerof-104850' value='434837' \/>&nbsp;<label for='answer-id-434837' id='answer-label-434837' class=' answer label-29'><span class='answer'>Enable AWS CloudTrail by creating individual trails for each region, and specify a single Amazon S3 bucket to receive log files for later analysis.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434838' \/><div class='watu-question-choice'><input type='radio' name='answer-104850[]' id='answer-id-434838' class='answer answer-29  answerof-104850' value='434838' \/>&nbsp;<label for='answer-id-434838' id='answer-label-434838' class=' answer label-29'><span class='answer'>Enable AWS CloudTrail by creating a new trail and applying the trail to all regions. Specify a single Amazon S3 bucket as the storage location.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434839' \/><div class='watu-question-choice'><input type='radio' name='answer-104850[]' id='answer-id-434839' class='answer answer-29  answerof-104850' value='434839' \/>&nbsp;<label for='answer-id-434839' id='answer-label-434839' class=' answer label-29'><span class='answer'>Enable Amazon CloudWatch logging for all AWS services across all regions, and aggregate them to a single Amazon S3 bucket for later analysis.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType29' value='radio' class=''><\/div><div class='watu-question' id='question-30'><div class='question-content'><p><span class='watu_num'>30. <\/span>A Security Administrator is performing a log analysis as a result of a suspected AWS account compromise. The Administrator wants to analyze suspicious AWS CloudTrail log files but is overwhelmed by the volume of audit logs being generated.<br \/>\n<br \/>What approach enables the Administrator to search through the logs MOST efficiently?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104851' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434840' \/><div class='watu-question-choice'><input type='radio' name='answer-104851[]' id='answer-id-434840' class='answer answer-30  answerof-104851' value='434840' \/>&nbsp;<label for='answer-id-434840' id='answer-label-434840' class=' answer label-30'><span class='answer'>Implement a \u201cwrite-only\u201d CloudTrail event filter to detect any modifications to the AWS account resources.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434841' \/><div class='watu-question-choice'><input type='radio' name='answer-104851[]' id='answer-id-434841' class='answer answer-30  answerof-104851' value='434841' \/>&nbsp;<label for='answer-id-434841' id='answer-label-434841' class=' answer label-30'><span class='answer'>Configure Amazon Macie to classify and discover sensitive data in the Amazon S3 bucket that contains the CloudTrail audit logs.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434842' \/><div class='watu-question-choice'><input type='radio' name='answer-104851[]' id='answer-id-434842' class='answer answer-30  answerof-104851' value='434842' \/>&nbsp;<label for='answer-id-434842' id='answer-label-434842' class=' answer label-30'><span class='answer'>Configure Amazon Athena to read from the CloudTrail S3 bucket and query the logs to examine account activities.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434843' \/><div class='watu-question-choice'><input type='radio' name='answer-104851[]' id='answer-id-434843' class='answer answer-30  answerof-104851' value='434843' \/>&nbsp;<label for='answer-id-434843' id='answer-label-434843' class=' answer label-30'><span class='answer'>Enable Amazon S3 event notifications to trigger an AWS Lambda function that sends an email alarm when there are new CloudTrail API entries.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType30' value='radio' class=''><\/div><div class='watu-question' id='question-31'><div class='question-content'><p><span class='watu_num'>31. <\/span>During a recent security audit, it was discovered that multiple teams in a large organization have placed restricted data in multiple Amazon S3 buckets, and the data may have been exposed. The auditor has requested that the organization identify all possible objects that contain personally identifiable information (PII) and then determine whether this information has been accessed.<br \/>\n<br \/>What solution will allow the Security team to complete this request?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104852' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434844' \/><div class='watu-question-choice'><input type='radio' name='answer-104852[]' id='answer-id-434844' class='answer answer-31  answerof-104852' value='434844' \/>&nbsp;<label for='answer-id-434844' id='answer-label-434844' class=' answer label-31'><span class='answer'>Using Amazon Athena, query the impacted S3 buckets by using the PII query identifier function. Then, create a new Amazon CloudWatch metric for Amazon S3 object access to alert when the objects are accessed.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434845' \/><div class='watu-question-choice'><input type='radio' name='answer-104852[]' id='answer-id-434845' class='answer answer-31  answerof-104852' value='434845' \/>&nbsp;<label for='answer-id-434845' id='answer-label-434845' class=' answer label-31'><span class='answer'>Enable Amazon Macie on the S3 buckets that were impacted, then perform data classification. For identified objects that contain PII, use the research function for auditing AWS CloudTrail logs and S3 bucket logs for GET operations.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434846' \/><div class='watu-question-choice'><input type='radio' name='answer-104852[]' id='answer-id-434846' class='answer answer-31  answerof-104852' value='434846' \/>&nbsp;<label for='answer-id-434846' id='answer-label-434846' class=' answer label-31'><span class='answer'>Enable Amazon GuardDuty and enable the PII rule set on the S3 buckets that were impacted, then perform data classification. Using the PII findings report from GuardDuty, query the S3 bucket logs by using Athena for GET operations.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434847' \/><div class='watu-question-choice'><input type='radio' name='answer-104852[]' id='answer-id-434847' class='answer answer-31  answerof-104852' value='434847' \/>&nbsp;<label for='answer-id-434847' id='answer-label-434847' class=' answer label-31'><span class='answer'>Enable Amazon Inspector on the S3 buckets that were impacted, then perform data classification. For identified objects that contain PII, query the S3 bucket logs by using Athena for GET operations.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType31' value='radio' class=''><\/div><div class='watu-question' id='question-32'><div class='question-content'><p><span class='watu_num'>32. <\/span>During a recent internal investigation, it was discovered that all API logging was disabled in a production account, and the root user had created new API keys that appear to have been used several times.<br \/>\n<br \/>What could have been done to detect and automatically remediate the incident?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104853' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434848' \/><div class='watu-question-choice'><input type='radio' name='answer-104853[]' id='answer-id-434848' class='answer answer-32  answerof-104853' value='434848' \/>&nbsp;<label for='answer-id-434848' id='answer-label-434848' class=' answer label-32'><span class='answer'>Using Amazon Inspector, review all of the API calls and configure the inspector agent to leverage SNS topics to notify security of the change to AWS CloudTrail, and revoke the new API keys for the root user.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434849' \/><div class='watu-question-choice'><input type='radio' name='answer-104853[]' id='answer-id-434849' class='answer answer-32  answerof-104853' value='434849' \/>&nbsp;<label for='answer-id-434849' id='answer-label-434849' class=' answer label-32'><span class='answer'>Using AWS Config, create a config rule that detects when AWS CloudTrail is disabled, as well as any calls to the root user create-api-key. Then use a Lambda function to re-enable CloudTrail logs and deactivate the root API keys.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434850' \/><div class='watu-question-choice'><input type='radio' name='answer-104853[]' id='answer-id-434850' class='answer answer-32  answerof-104853' value='434850' \/>&nbsp;<label for='answer-id-434850' id='answer-label-434850' class=' answer label-32'><span class='answer'>Using Amazon CloudWatch, create a CloudWatch event that detects AWS CloudTrail deactivation and a separate Amazon Trusted Advisor check to automatically detect the creation of root API keys. Then use a Lambda function to enable AWS CloudTrail and deactivate the root API keys.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434851' \/><div class='watu-question-choice'><input type='radio' name='answer-104853[]' id='answer-id-434851' class='answer answer-32  answerof-104853' value='434851' \/>&nbsp;<label for='answer-id-434851' id='answer-label-434851' class=' answer label-32'><span class='answer'>Using Amazon CloudTrail, create a new CloudTrail event that detects the deactivation of CloudTrail logs, and a separate CloudTrail event that detects the creation of root API keys. Then use a Lambda function to enable CloudTrail and deactivate the root API keys.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType32' value='radio' class=''><\/div><div class='watu-question' id='question-33'><div class='question-content'><p><span class='watu_num'>33. <\/span>An application has a requirement to be resilient across not only Availability Zones within the application\u2019s primary region but also be available within another region altogether.<br \/>\n<br \/>Which of the following supports this requirement for AWS resources that are encrypted by AWS KMS?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104854' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434852' \/><div class='watu-question-choice'><input type='radio' name='answer-104854[]' id='answer-id-434852' class='answer answer-33  answerof-104854' value='434852' \/>&nbsp;<label for='answer-id-434852' id='answer-label-434852' class=' answer label-33'><span class='answer'>Copy the application\u2019s AWS KMS CMK from the source region to the target region so that it can be used to decrypt the resource after it is copied to the target region.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434853' \/><div class='watu-question-choice'><input type='radio' name='answer-104854[]' id='answer-id-434853' class='answer answer-33  answerof-104854' value='434853' \/>&nbsp;<label for='answer-id-434853' id='answer-label-434853' class=' answer label-33'><span class='answer'>Configure AWS KMS to automatically synchronize the CMK between regions so that it can be used to decrypt the resource in the target region.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434854' \/><div class='watu-question-choice'><input type='radio' name='answer-104854[]' id='answer-id-434854' class='answer answer-33  answerof-104854' value='434854' \/>&nbsp;<label for='answer-id-434854' id='answer-label-434854' class=' answer label-33'><span class='answer'>Use AWS services that replicate data across regions, and re-wrap the data encryption key created in the source region by using the CMK in the target region so that the target region\u2019s CMK can decrypt the database encryption key.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434855' \/><div class='watu-question-choice'><input type='radio' name='answer-104854[]' id='answer-id-434855' class='answer answer-33  answerof-104854' value='434855' \/>&nbsp;<label for='answer-id-434855' id='answer-label-434855' class=' answer label-33'><span class='answer'>Configure the target region\u2019s AWS service to communicate with the source region\u2019s AWS KMS so that it can decrypt the resource in the target region.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType33' value='radio' class=''><\/div><div class='watu-question' id='question-34'><div class='question-content'><p><span class='watu_num'>34. <\/span>An organization policy states that all encryption keys must be automatically rotated every 12 months.<br \/>\n<br \/>Which AWS Key Management Service (KMS) key type should be used to meet this requirement?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104855' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434856' \/><div class='watu-question-choice'><input type='radio' name='answer-104855[]' id='answer-id-434856' class='answer answer-34  answerof-104855' value='434856' \/>&nbsp;<label for='answer-id-434856' id='answer-label-434856' class=' answer label-34'><span class='answer'>AWS managed Customer Master Key (CMK)<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434857' \/><div class='watu-question-choice'><input type='radio' name='answer-104855[]' id='answer-id-434857' class='answer answer-34  answerof-104855' value='434857' \/>&nbsp;<label for='answer-id-434857' id='answer-label-434857' class=' answer label-34'><span class='answer'>Customer managed CMK with AWS generated key material<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434858' \/><div class='watu-question-choice'><input type='radio' name='answer-104855[]' id='answer-id-434858' class='answer answer-34  answerof-104855' value='434858' \/>&nbsp;<label for='answer-id-434858' id='answer-label-434858' class=' answer label-34'><span class='answer'>Customer managed CMK with imported key material<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434859' \/><div class='watu-question-choice'><input type='radio' name='answer-104855[]' id='answer-id-434859' class='answer answer-34  answerof-104855' value='434859' \/>&nbsp;<label for='answer-id-434859' id='answer-label-434859' class=' answer label-34'><span class='answer'>AWS managed data key<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType34' value='radio' class=''><\/div><div class='watu-question' id='question-35'><div class='question-content'><p><span class='watu_num'>35. <\/span>A Security Engineer received an AWS Abuse Notice listing EC2 instance IDs that are reportedly abusing other hosts.<br \/>\n<br \/>Which action should the Engineer take based on this situation? (Choose three.)<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104856' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434860' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104856[]' id='answer-id-434860' class='answer answer-35  answerof-104856' value='434860' \/>&nbsp;<label for='answer-id-434860' id='answer-label-434860' class=' answer label-35'><span class='answer'>Use AWS Artifact to capture an exact image of the state of each instance.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434861' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104856[]' id='answer-id-434861' class='answer answer-35  answerof-104856' value='434861' \/>&nbsp;<label for='answer-id-434861' id='answer-label-434861' class=' answer label-35'><span class='answer'>Create EBS Snapshots of each of the volumes attached to the compromised instances.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434862' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104856[]' id='answer-id-434862' class='answer answer-35  answerof-104856' value='434862' \/>&nbsp;<label for='answer-id-434862' id='answer-label-434862' class=' answer label-35'><span class='answer'>Capture a memory dump.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434863' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104856[]' id='answer-id-434863' class='answer answer-35  answerof-104856' value='434863' \/>&nbsp;<label for='answer-id-434863' id='answer-label-434863' class=' answer label-35'><span class='answer'>Log in to each instance with administrative credentials to restart the instance.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434864' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104856[]' id='answer-id-434864' class='answer answer-35  answerof-104856' value='434864' \/>&nbsp;<label for='answer-id-434864' id='answer-label-434864' class=' answer label-35'><span class='answer'>Revoke all network ingress and egress except for to\/from a forensics.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434865' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104856[]' id='answer-id-434865' class='answer answer-35  answerof-104856' value='434865' \/>&nbsp;<label for='answer-id-434865' id='answer-label-434865' class=' answer label-35'><span class='answer'>Run Auto Recovery for Amazon EC2.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType35' value='checkbox' class=''><\/div><div class='watu-question' id='question-36'><div class='question-content'><p><span class='watu_num'>36. <\/span>A Security Administrator is configuring an Amazon S3 bucket and must meet the following security requirements:<br \/>\n<br \/>&#8211; Encryption in transit<br \/>\n<br \/>&#8211; Encryption at rest<br \/>\n<br \/>&#8211; Logging of all object retrievals in AWS CloudTrail<br \/>\n<br \/>Which of the following meet these security requirements? (Choose three.)<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104857' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434866' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104857[]' id='answer-id-434866' class='answer answer-36  answerof-104857' value='434866' \/>&nbsp;<label for='answer-id-434866' id='answer-label-434866' class=' answer label-36'><span class='answer'>Specify \u201caws:SecureTransport\u201d: \u201ctrue\u201d within a condition in the S3 bucket policy.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434867' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104857[]' id='answer-id-434867' class='answer answer-36  answerof-104857' value='434867' \/>&nbsp;<label for='answer-id-434867' id='answer-label-434867' class=' answer label-36'><span class='answer'>Enable a security group for the S3 bucket that allows port 443, but not port 80.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434868' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104857[]' id='answer-id-434868' class='answer answer-36  answerof-104857' value='434868' \/>&nbsp;<label for='answer-id-434868' id='answer-label-434868' class=' answer label-36'><span class='answer'>Set up default encryption for the S3 bucket.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434869' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104857[]' id='answer-id-434869' class='answer answer-36  answerof-104857' value='434869' \/>&nbsp;<label for='answer-id-434869' id='answer-label-434869' class=' answer label-36'><span class='answer'>Enable Amazon CloudWatch Logs for the AWS account.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434870' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104857[]' id='answer-id-434870' class='answer answer-36  answerof-104857' value='434870' \/>&nbsp;<label for='answer-id-434870' id='answer-label-434870' class=' answer label-36'><span class='answer'>Enable API logging of data events for all S3 objects.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434871' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104857[]' id='answer-id-434871' class='answer answer-36  answerof-104857' value='434871' \/>&nbsp;<label for='answer-id-434871' id='answer-label-434871' class=' answer label-36'><span class='answer'>Enable S3 object versioning for the S3 bucket.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType36' value='checkbox' class=''><\/div><div class='watu-question' id='question-37'><div class='question-content'><p><span class='watu_num'>37. <\/span>What is the function of the following AWS Key Management Service (KMS) key policy attached to a customer master key (CMK)? <\/p>\n<p><img decoding=\"async\" width=554 height=389 src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2018\/exams\/SCS-C01%20V8.files\/image021.jpg\" v:shapes=\"_x0000_i1034\"><\/p>\n<\/div><input type='hidden' name='question_id[]' value='104858' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434872' \/><div class='watu-question-choice'><input type='radio' name='answer-104858[]' id='answer-id-434872' class='answer answer-37  answerof-104858' value='434872' \/>&nbsp;<label for='answer-id-434872' id='answer-label-434872' class=' answer label-37'><span class='answer'>The Amazon WorkMail and Amazon SES services have delegated KMS encrypt and delegated KMS encrypt and decrypt permissions to the ExampleUser principal in the 111122223333 account.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434873' \/><div class='watu-question-choice'><input type='radio' name='answer-104858[]' id='answer-id-434873' class='answer answer-37  answerof-104858' value='434873' \/>&nbsp;<label for='answer-id-434873' id='answer-label-434873' class=' answer label-37'><span class='answer'>The ExampleUser principal can transparently encrypt and decrypt email exchanges specifically between ExampleUser and AW<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434874' \/><div class='watu-question-choice'><input type='radio' name='answer-104858[]' id='answer-id-434874' class='answer answer-37  answerof-104858' value='434874' \/>&nbsp;<label for='answer-id-434874' id='answer-label-434874' class=' answer label-37'><span class='answer'>The CMK is to be used for encrypting and decrypting only when the principal is ExampleUser and the request comes from WorkMail or SES in the specified region.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434875' \/><div class='watu-question-choice'><input type='radio' name='answer-104858[]' id='answer-id-434875' class='answer answer-37  answerof-104858' value='434875' \/>&nbsp;<label for='answer-id-434875' id='answer-label-434875' class=' answer label-37'><span class='answer'>The key policy allows WorkMail or SES to encrypt or decrypt on behalf of the user for any CMK in the account.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType37' value='radio' class=''><\/div><div class='watu-question' id='question-38'><div class='question-content'><p><span class='watu_num'>38. <\/span>A Security Engineer who was reviewing AWS Key Management Service (AWS KMS) key policies found this statement in each key policy in the company AWS account. <\/p>\n<p><img decoding=\"async\" width=482 height=155 src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2018\/exams\/SCS-C01%20V8.files\/image023.jpg\" v:shapes=\"_x0000_i1035\"><\/p>\n<p>What does the statement allow?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104859' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434876' \/><div class='watu-question-choice'><input type='radio' name='answer-104859[]' id='answer-id-434876' class='answer answer-38  answerof-104859' value='434876' \/>&nbsp;<label for='answer-id-434876' id='answer-label-434876' class=' answer label-38'><span class='answer'>All principals from all AWS accounts to use the key.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434877' \/><div class='watu-question-choice'><input type='radio' name='answer-104859[]' id='answer-id-434877' class='answer answer-38  answerof-104859' value='434877' \/>&nbsp;<label for='answer-id-434877' id='answer-label-434877' class=' answer label-38'><span class='answer'>Only the root user from account 111122223333 to use the key.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434878' \/><div class='watu-question-choice'><input type='radio' name='answer-104859[]' id='answer-id-434878' class='answer answer-38  answerof-104859' value='434878' \/>&nbsp;<label for='answer-id-434878' id='answer-label-434878' class=' answer label-38'><span class='answer'>All principals from account 111122223333 to use the key but only on Amazon S3.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434879' \/><div class='watu-question-choice'><input type='radio' name='answer-104859[]' id='answer-id-434879' class='answer answer-38  answerof-104859' value='434879' \/>&nbsp;<label for='answer-id-434879' id='answer-label-434879' class=' answer label-38'><span class='answer'>Only principals from account 111122223333 that have an IAM policy applied that grants access to this key to use the key.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType38' value='radio' class=''><\/div><div class='watu-question' id='question-39'><div class='question-content'><p><span class='watu_num'>39. <\/span>A Software Engineer wrote a customized reporting service that will run on a fleet of Amazon EC2 instances. The company security policy states that application logs for the reporting service must be centrally collected.<br \/>\n<br \/>What is the MOST efficient way to meet these requirements?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104860' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434880' \/><div class='watu-question-choice'><input type='radio' name='answer-104860[]' id='answer-id-434880' class='answer answer-39  answerof-104860' value='434880' \/>&nbsp;<label for='answer-id-434880' id='answer-label-434880' class=' answer label-39'><span class='answer'>Write an AWS Lambda function that logs into the EC2 instance to pull the application logs from the EC2 instance and persists them into an Amazon S3 bucket.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434881' \/><div class='watu-question-choice'><input type='radio' name='answer-104860[]' id='answer-id-434881' class='answer answer-39  answerof-104860' value='434881' \/>&nbsp;<label for='answer-id-434881' id='answer-label-434881' class=' answer label-39'><span class='answer'>Enable AWS CloudTrail logging for the AWS account, create a new Amazon S3 bucket, and then configure Amazon CloudWatch Logs to receive the application logs from CloudTrail.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434882' \/><div class='watu-question-choice'><input type='radio' name='answer-104860[]' id='answer-id-434882' class='answer answer-39  answerof-104860' value='434882' \/>&nbsp;<label for='answer-id-434882' id='answer-label-434882' class=' answer label-39'><span class='answer'>Create a simple cron job on the EC2 instances that synchronizes the application logs to an Amazon S3 bucket by using rsync.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434883' \/><div class='watu-question-choice'><input type='radio' name='answer-104860[]' id='answer-id-434883' class='answer answer-39  answerof-104860' value='434883' \/>&nbsp;<label for='answer-id-434883' id='answer-label-434883' class=' answer label-39'><span class='answer'>Install the Amazon CloudWatch Logs Agent on the EC2 instances, and configure it to send the application logs to CloudWatch Logs.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType39' value='radio' class=''><\/div><div class='watu-question' id='question-40'><div class='question-content'><p><span class='watu_num'>40. <\/span>A Security Engineer is trying to determine whether the encryption keys used in an AWS service are in compliance with certain regulatory standards.<br \/>\n<br \/>Which of the following actions should the Engineer perform to get further guidance?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104861' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434884' \/><div class='watu-question-choice'><input type='radio' name='answer-104861[]' id='answer-id-434884' class='answer answer-40  answerof-104861' value='434884' \/>&nbsp;<label for='answer-id-434884' id='answer-label-434884' class=' answer label-40'><span class='answer'>Read the AWS Customer Agreement.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434885' \/><div class='watu-question-choice'><input type='radio' name='answer-104861[]' id='answer-id-434885' class='answer answer-40  answerof-104861' value='434885' \/>&nbsp;<label for='answer-id-434885' id='answer-label-434885' class=' answer label-40'><span class='answer'>Use AWS Artifact to access AWS compliance reports.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434886' \/><div class='watu-question-choice'><input type='radio' name='answer-104861[]' id='answer-id-434886' class='answer answer-40  answerof-104861' value='434886' \/>&nbsp;<label for='answer-id-434886' id='answer-label-434886' class=' answer label-40'><span class='answer'>Post the question on the AWS Discussion Forums.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434887' \/><div class='watu-question-choice'><input type='radio' name='answer-104861[]' id='answer-id-434887' class='answer answer-40  answerof-104861' value='434887' \/>&nbsp;<label for='answer-id-434887' id='answer-label-434887' class=' answer label-40'><span class='answer'>Run AWS Config and evaluate the configuration outputs.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType40' value='radio' class=''><\/div><div class='watu-question' id='question-41'><div class='question-content'><p><span class='watu_num'>41. <\/span>The Development team receives an error message each time the team members attempt to encrypt or decrypt a Secure String parameter from the SSM Parameter Store by using an AWS KMS customer managed key (CMK).<br \/>\n<br \/>Which CMK-related issues could be responsible? (Choose two.)<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104862' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434888' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104862[]' id='answer-id-434888' class='answer answer-41  answerof-104862' value='434888' \/>&nbsp;<label for='answer-id-434888' id='answer-label-434888' class=' answer label-41'><span class='answer'>The CMK specified in the application does not exist.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434889' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104862[]' id='answer-id-434889' class='answer answer-41  answerof-104862' value='434889' \/>&nbsp;<label for='answer-id-434889' id='answer-label-434889' class=' answer label-41'><span class='answer'>The CMK specified in the application is currently is use.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434890' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104862[]' id='answer-id-434890' class='answer answer-41  answerof-104862' value='434890' \/>&nbsp;<label for='answer-id-434890' id='answer-label-434890' class=' answer label-41'><span class='answer'>The CMK specified in the application is using the CMK KeyID instead of CMK Amazon Resource Name.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434891' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104862[]' id='answer-id-434891' class='answer answer-41  answerof-104862' value='434891' \/>&nbsp;<label for='answer-id-434891' id='answer-label-434891' class=' answer label-41'><span class='answer'>The CMK specified in the application is not enabled.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434892' \/><div class='watu-question-choice'><input type='checkbox' name='answer-104862[]' id='answer-id-434892' class='answer answer-41  answerof-104862' value='434892' \/>&nbsp;<label for='answer-id-434892' id='answer-label-434892' class=' answer label-41'><span class='answer'>The CMK specified in the application is using an alias.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType41' value='checkbox' class=''><\/div><div class='watu-question' id='question-42'><div class='question-content'><p><span class='watu_num'>42. <\/span>An application has been written that publishes custom metrics to Amazon CloudWatch. Recently, IAM change have been made on the account and the metrics are no longer being reported.<br \/>\n<br \/>Which of the following is the LEAST permissive solution that will allow the metrics to be delivered?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104863' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434893' \/><div class='watu-question-choice'><input type='radio' name='answer-104863[]' id='answer-id-434893' class='answer answer-42  answerof-104863' value='434893' \/>&nbsp;<label for='answer-id-434893' id='answer-label-434893' class=' answer label-42'><span class='answer'>Add a statement to the IAM policy used by the application to allow logs:putLogEvents and logs:createLogStream<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434894' \/><div class='watu-question-choice'><input type='radio' name='answer-104863[]' id='answer-id-434894' class='answer answer-42  answerof-104863' value='434894' \/>&nbsp;<label for='answer-id-434894' id='answer-label-434894' class=' answer label-42'><span class='answer'>Modify the IAM role used by the application by adding the CloudWatchFullAccess managed policy.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434895' \/><div class='watu-question-choice'><input type='radio' name='answer-104863[]' id='answer-id-434895' class='answer answer-42  answerof-104863' value='434895' \/>&nbsp;<label for='answer-id-434895' id='answer-label-434895' class=' answer label-42'><span class='answer'>Add a statement to the IAM policy used by the application to allow cloudwatch:putMetric Data.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434896' \/><div class='watu-question-choice'><input type='radio' name='answer-104863[]' id='answer-id-434896' class='answer answer-42  answerof-104863' value='434896' \/>&nbsp;<label for='answer-id-434896' id='answer-label-434896' class=' answer label-42'><span class='answer'>Add a trust relationship to the IAM role used by the application for cloudwatch.amazonaws.com.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType42' value='radio' class=''><\/div><div class='watu-question' id='question-43'><div class='question-content'><p><span class='watu_num'>43. <\/span>A Developer\u2019s laptop was stolen. The laptop was not encrypted, and it contained the SSH key used to access multiple Amazon EC2 instances. A Security Engineer has verified that the key has not been used, and has blocked port 22 to all EC2 instances while developing a response plan.<br \/>\n<br \/>How can the Security Engineer further protect currently running instances?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='104864' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434897' \/><div class='watu-question-choice'><input type='radio' name='answer-104864[]' id='answer-id-434897' class='answer answer-43  answerof-104864' value='434897' \/>&nbsp;<label for='answer-id-434897' id='answer-label-434897' class=' answer label-43'><span class='answer'>Delete the key-pair key from the EC2 console, then create a new key pair.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434898' \/><div class='watu-question-choice'><input type='radio' name='answer-104864[]' id='answer-id-434898' class='answer answer-43  answerof-104864' value='434898' \/>&nbsp;<label for='answer-id-434898' id='answer-label-434898' class=' answer label-43'><span class='answer'>Use the modify-instance-attribute API to change the key on any EC2 instance that is using the key.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434899' \/><div class='watu-question-choice'><input type='radio' name='answer-104864[]' id='answer-id-434899' class='answer answer-43  answerof-104864' value='434899' \/>&nbsp;<label for='answer-id-434899' id='answer-label-434899' class=' answer label-43'><span class='answer'>Use the EC2 RunCommand to modify the authorized_keys file on any EC2 instance that is using the key.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='434900' \/><div class='watu-question-choice'><input type='radio' name='answer-104864[]' id='answer-id-434900' class='answer answer-43  answerof-104864' value='434900' \/>&nbsp;<label for='answer-id-434900' id='answer-label-434900' class=' answer label-43'><span class='answer'>Update the key pair in any AMI used to launch the EC2 instances, then restart the EC2 instances.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType43' value='radio' class=''><\/div><div style='display:none' id='question-44'><br \/><div class='question-content'><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watu\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading ...\" title=\"Loading ...\" \/>&nbsp;Loading &#8230;<\/div><\/div><br \/>\n<input type=\"button\" name=\"action\" onclick=\"Watu.submitResult()\" id=\"action-button\" value=\"Submit\"  class=\"watu-submit-button\" \/>\n<input type=\"hidden\" name=\"no_ajax\" value=\"0\"><input type=\"hidden\" name=\"quiz_id\" value=\"1809\" \/>\n<input type=\"hidden\" id=\"watuStartTime\" name=\"start_time\" value=\"2026-05-11 15:01:33\" \/>\n<\/form>\n<\/div>\n<div id=\"watu-loading-result\" style=\"display:none;\">\n\t<p align=\"center\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watu\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading\" title=\"Loading\" \/><\/p>\n<\/div>\t\n<script type=\"text\/javascript\">\nvar exam_id=0;\nvar question_ids='';\nvar watuURL='';\njQuery(function($){\nquestion_ids = \"104822,104823,104824,104825,104826,104827,104828,104829,104830,104831,104832,104833,104834,104835,104836,104837,104838,104839,104840,104841,104842,104843,104844,104845,104846,104847,104848,104849,104850,104851,104852,104853,104854,104855,104856,104857,104858,104859,104860,104861,104862,104863,104864\";\nexam_id = 1809;\nWatu.exam_id = exam_id;\nWatu.qArr = question_ids.split(',');\nWatu.post_id = 4327;\nWatu.singlePage = '1';\nWatu.hAppID = \"0.88427000 1778511693\";\nwatuURL = \"https:\/\/www.dumpsbase.com\/freedumps\/wp-admin\/admin-ajax.php\";\nWatu.noAlertUnanswered = 0;\n});\n<\/script>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[175,7454],"tags":[7453,7451,7452],"class_list":["post-4327","post","type-post","status-publish","format-standard","hentry","category-amazon","category-aws-certified-security-specialty","tag-aws-certified-security-specialty","tag-scs-c01","tag-scs-c01-exam-dumps"],"_links":{"self":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/4327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/comments?post=4327"}],"version-history":[{"count":1,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/4327\/revisions"}],"predecessor-version":[{"id":4328,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/4327\/revisions\/4328"}],"wp:attachment":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/media?parent=4327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/categories?post=4327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/tags?post=4327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}