{"id":68166,"date":"2023-11-24T00:59:58","date_gmt":"2023-11-24T00:59:58","guid":{"rendered":"https:\/\/www.dumpsbase.com\/freedumps\/?p=68166"},"modified":"2023-11-24T01:00:03","modified_gmt":"2023-11-24T01:00:03","slug":"come-and-download-the-amazon-scs-c02-dumps-v10-03-pass-with-real-scs-c02-exam-questions-and-answers","status":"publish","type":"post","link":"https:\/\/www.dumpsbase.com\/freedumps\/come-and-download-the-amazon-scs-c02-dumps-v10-03-pass-with-real-scs-c02-exam-questions-and-answers.html","title":{"rendered":"Come and Download the Amazon SCS-C02 Dumps (V10.03) &#8211; Pass with Real SCS-C02 Exam Questions and Answers"},"content":{"rendered":"\n<p>Great news, the team of Amazon experts at DumpsBase is dedicated to providing the most updated Amazon SCS-C02 exam dumps (V10.03) to help you pass the SCS-C02 AWS Certified Security &#8211; Specialty certification on your first try. These dumps are meticulously crafted and designed to ensure that you are well-prepared for the exam. With the comprehensive coverage of the exam objectives, you can confidently tackle all the topics and domains tested in the AWS Certified Security &#8211; Specialty certification exam. The updated Amazon SCS-C02 dumps (V10.03) are not only accurate and verified but also help you clear any doubts you may have regarding the Amazon SCS-C02 test questions. By using real SCS-C02 exam questions and answers in the dumps, you can accelerate your learning process, easily grasp complex concepts, and develop new skills that are essential for securing applications and data on AWS platforms. Access the Amazon SCS-C02 dumps V10.03 of DumpsBase to make preparations now.<\/p>\n<h2>Find below the most captivating <em><span style=\"background-color: #ffff00;\">Amazon SCS-C02 Free Dumps Demo<\/span><\/em>:<\/h2>\n<script>\n\t  window.fbAsyncInit = function() {\n\t    FB.init({\n\t      appId            : '622169541470367',\n\t      autoLogAppEvents : true,\n\t      xfbml            : true,\n\t      version          : 'v3.1'\n\t    });\n\t  };\n\t\n\t  (function(d, s, id){\n\t     var js, fjs = d.getElementsByTagName(s)[0];\n\t     if (d.getElementById(id)) {return;}\n\t     js = d.createElement(s); js.id = id;\n\t     js.src = \"https:\/\/connect.facebook.net\/en_US\/sdk.js\";\n\t     fjs.parentNode.insertBefore(js, fjs);\n\t   }(document, 'script', 'facebook-jssdk'));\n\t<\/script><script type=\"text\/javascript\" >\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \nif(!window.jQuery) alert(\"The important jQuery library is not properly loaded in your site. Your WordPress theme is probably missing the essential wp_head() call. You can switch to another theme and you will see that the plugin works fine and this notice disappears. If you are still not sure what to do you can contact us for help.\");\n});\n<\/script>  \n  \n<div  id=\"watupro_quiz\" class=\"quiz-area single-page-quiz\">\n<p id=\"submittingExam7938\" style=\"display:none;text-align:center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\"><\/p>\n\n<div class=\"watupro-exam-description\" id=\"description-quiz-7938\"><\/div>\n\n<form action=\"\" method=\"post\" class=\"quiz-form\" id=\"quiz-7938\"  enctype=\"multipart\/form-data\" >\n<div class='watu-question ' id='question-1' style=';'><div id='questionWrap-1'  class='   watupro-question-id-297022'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>1. <\/span>A business requires a forensic logging solution for hundreds of Docker-based apps running on Amazon EC2. <br \/>\r<br>The solution must analyze logs in real time, provide message replay, and persist logs. <br \/>\r<br>Which Amazon Web Offerings (IAM) services should be employed to satisfy these requirements? (Select two.)<\/div><input type='hidden' name='question_id[]' id='qID_1' value='297022' \/><input type='hidden' id='answerType297022' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297022[]' id='answer-id-1165468' class='answer   answerof-297022 ' value='1165468'   \/><label for='answer-id-1165468' id='answer-label-1165468' class=' answer'><span>Amazon Athena<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297022[]' id='answer-id-1165469' class='answer   answerof-297022 ' value='1165469'   \/><label for='answer-id-1165469' id='answer-label-1165469' class=' answer'><span>Amazon Kinesis<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297022[]' id='answer-id-1165470' class='answer   answerof-297022 ' value='1165470'   \/><label for='answer-id-1165470' id='answer-label-1165470' class=' answer'><span>Amazon SQS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297022[]' id='answer-id-1165471' class='answer   answerof-297022 ' value='1165471'   \/><label for='answer-id-1165471' id='answer-label-1165471' class=' answer'><span>Amazon Elasticsearch<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297022[]' id='answer-id-1165472' class='answer   answerof-297022 ' value='1165472'   \/><label for='answer-id-1165472' id='answer-label-1165472' class=' answer'><span>Amazon EMR<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-2' style=';'><div id='questionWrap-2'  class='   watupro-question-id-297023'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>2. <\/span>A company developed an application by using AWS Lambda, Amazon S3, Amazon Simple Notification Service (Amazon SNS), and Amazon DynamoDB. An external application puts objects into the company's S3 bucket and tags the objects with date and time. A Lambda function periodically pulls data from the company's S3 bucket based on date and time tags and inserts specific values into a DynamoDB table for further processing. <br \/>\r<br>The data includes personally identifiable information (Pll). The company must remove data that is older than 30 days from the S3 bucket and the DynamoDB table. <br \/>\r<br>Which solution will meet this requirement with the MOST operational efficiency?<\/div><input type='hidden' name='question_id[]' id='qID_2' value='297023' \/><input type='hidden' id='answerType297023' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297023[]' id='answer-id-1165473' class='answer   answerof-297023 ' value='1165473'   \/><label for='answer-id-1165473' id='answer-label-1165473' class=' answer'><span>Update the Lambda function to add a TTL S3 flag to S3 objects. Create an S3 Lifecycle policy to expire objects that are older than 30 days by using the TTL S3 flag.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297023[]' id='answer-id-1165474' class='answer   answerof-297023 ' value='1165474'   \/><label for='answer-id-1165474' id='answer-label-1165474' class=' answer'><span>Create an S3 Lifecycle policy to expire objects that are older than 30 days. Update the Lambda function to add the TTL attribute in the DynamoDB table. Enable TTL on the DynamoDB table to expire entires that are older than 30 days based on the TTL attribute.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297023[]' id='answer-id-1165475' class='answer   answerof-297023 ' value='1165475'   \/><label for='answer-id-1165475' id='answer-label-1165475' class=' answer'><span>Create an S3 Lifecycle policy to expire objects that are older than 30 days and to add all prefixes to the S3 bucket. Update the Lambda function to delete entries that are older than 30 days.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297023[]' id='answer-id-1165476' class='answer   answerof-297023 ' value='1165476'   \/><label for='answer-id-1165476' id='answer-label-1165476' class=' answer'><span>Create an S3 Lifecycle policy to expire objects that are older than 30 days by using object tags. Update the Lambda function to delete entries that are older than 30 days.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-3' style=';'><div id='questionWrap-3'  class='   watupro-question-id-297024'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>3. <\/span>A company is hosting a static website on Amazon S3 The company has configured an Amazon CloudFront distribution to serve the website contents. The company has associated an IAM WAF web ACL with the CloudFront distribution. The web ACL ensures that requests originate from the United States to address compliance restrictions. <br \/>\r<br>THE company is worried that the S3 URL might still be accessible directly and that requests can bypass the CloudFront distribution <br \/>\r<br>Which combination of steps should the company take to remove direct access to the S3 URL? (Select TWO.)<\/div><input type='hidden' name='question_id[]' id='qID_3' value='297024' \/><input type='hidden' id='answerType297024' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297024[]' id='answer-id-1165477' class='answer   answerof-297024 ' value='1165477'   \/><label for='answer-id-1165477' id='answer-label-1165477' class=' answer'><span>Select &quot;Restrict Bucket Access&quot; in the origin settings of the CloudFront distribution<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297024[]' id='answer-id-1165478' class='answer   answerof-297024 ' value='1165478'   \/><label for='answer-id-1165478' id='answer-label-1165478' class=' answer'><span>Create an origin access identity (OAI) for the S3 origin<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297024[]' id='answer-id-1165479' class='answer   answerof-297024 ' value='1165479'   \/><label for='answer-id-1165479' id='answer-label-1165479' class=' answer'><span>Update the S3 bucket policy to allow s3 GetObject with a condition that the IAM Referer key matches the secret value Deny all other requests<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297024[]' id='answer-id-1165480' class='answer   answerof-297024 ' value='1165480'   \/><label for='answer-id-1165480' id='answer-label-1165480' class=' answer'><span>Configure the S3 bucket poky so that only the origin access identity (OAI) has read permission for objects in the bucket<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297024[]' id='answer-id-1165481' class='answer   answerof-297024 ' value='1165481'   \/><label for='answer-id-1165481' id='answer-label-1165481' class=' answer'><span>Add an origin custom header that has the name Referer to the CloudFront distribution Give the header a secret value.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-4' style=';'><div id='questionWrap-4'  class='   watupro-question-id-297025'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>4. <\/span>A company is testing its incident response plan for compromised credentials. The company runs a database on an Amazon EC2 instance and stores the sensitive data-base credentials as a secret in AWS Secrets Manager. The secret has rotation configured with an AWS Lambda function that uses the generic rotation function template. The EC2 instance and the Lambda function are deployed in the same private subnet. The VPC has a Secrets Manager VPC endpoint. <br \/>\r<br>A security engineer discovers that the secret cannot rotate. The security engineer determines that the VPC endpoint is working as intended. The Amazon Cloud-Watch logs contain the following error: <br \/>\r<br>&quot;setSecret: Unable to log into database&quot;. <br \/>\r<br>Which solution will resolve this error?<\/div><input type='hidden' name='question_id[]' id='qID_4' value='297025' \/><input type='hidden' id='answerType297025' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297025[]' id='answer-id-1165482' class='answer   answerof-297025 ' value='1165482'   \/><label for='answer-id-1165482' id='answer-label-1165482' class=' answer'><span>Use the AWS Management Console to edit the JSON structure of the secret in Secrets Manager so that the secret automatically conforms with the structure that the database requires.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297025[]' id='answer-id-1165483' class='answer   answerof-297025 ' value='1165483'   \/><label for='answer-id-1165483' id='answer-label-1165483' class=' answer'><span>Ensure that the security group that is attached to the Lambda function al-lows outbound connections to the EC2 instance. Ensure that the security group that is attached to the EC2 instance allows inbound connections from the security group that is attached to the Lambda function.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297025[]' id='answer-id-1165484' class='answer   answerof-297025 ' value='1165484'   \/><label for='answer-id-1165484' id='answer-label-1165484' class=' answer'><span>Use the Secrets Manager list-secrets command in the AWS CLI to list the secret. Identify the database \r\ncredentials. Use the Secrets Manager rotate-secret command in the AWS CLI to force the immediate rotation of the secret.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297025[]' id='answer-id-1165485' class='answer   answerof-297025 ' value='1165485'   \/><label for='answer-id-1165485' id='answer-label-1165485' class=' answer'><span>Add an internet gateway to the VP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297025[]' id='answer-id-1165486' class='answer   answerof-297025 ' value='1165486'   \/><label for='answer-id-1165486' id='answer-label-1165486' class=' answer'><span>Create a NAT gateway in a public sub-net. Update the VPC route tables so that traffic from the Lambda function and traffic from the EC2 instance can reach the Secrets Manager public endpoint.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-5' style=';'><div id='questionWrap-5'  class='   watupro-question-id-297026'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>5. <\/span>A company needs a forensic-logging solution for hundreds of applications running in Docker on Amazon EC2 The solution must perform real-time analytics on the togs must support the replay of messages and must persist the logs. <br \/>\r<br>Which IAM services should be used to meet these requirements? (Select TWO)<\/div><input type='hidden' name='question_id[]' id='qID_5' value='297026' \/><input type='hidden' id='answerType297026' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297026[]' id='answer-id-1165487' class='answer   answerof-297026 ' value='1165487'   \/><label for='answer-id-1165487' id='answer-label-1165487' class=' answer'><span>Amazon Athena<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297026[]' id='answer-id-1165488' class='answer   answerof-297026 ' value='1165488'   \/><label for='answer-id-1165488' id='answer-label-1165488' class=' answer'><span>Amazon Kinesis<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297026[]' id='answer-id-1165489' class='answer   answerof-297026 ' value='1165489'   \/><label for='answer-id-1165489' id='answer-label-1165489' class=' answer'><span>Amazon SQS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297026[]' id='answer-id-1165490' class='answer   answerof-297026 ' value='1165490'   \/><label for='answer-id-1165490' id='answer-label-1165490' class=' answer'><span>Amazon Elasticsearch<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297026[]' id='answer-id-1165491' class='answer   answerof-297026 ' value='1165491'   \/><label for='answer-id-1165491' id='answer-label-1165491' class=' answer'><span>Amazon EMR<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-6' style=';'><div id='questionWrap-6'  class='   watupro-question-id-297027'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>6. <\/span>A company is evaluating the use of AWS Systems Manager Session Manager to gam access to the company's Amazon EC2 instances. However, until the company implements the change, the company must protect the key file for the EC2 instances from read and write operations by any other users. <br \/>\r<br>When a security administrator tries to connect to a critical EC2 Linux instance during an emergency, the security administrator receives the following error. &quot;Error Unprotected private key file - Permissions for' ssh\/my_private_key pern' are too open&quot;. <br \/>\r<br>Which command should the security administrator use to modify the private key Me permissions to resolve this error?<\/div><input type='hidden' name='question_id[]' id='qID_6' value='297027' \/><input type='hidden' id='answerType297027' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297027[]' id='answer-id-1165492' class='answer   answerof-297027 ' value='1165492'   \/><label for='answer-id-1165492' id='answer-label-1165492' class=' answer'><span>chmod 0040 ssh\/my_private_key pern<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297027[]' id='answer-id-1165493' class='answer   answerof-297027 ' value='1165493'   \/><label for='answer-id-1165493' id='answer-label-1165493' class=' answer'><span>chmod 0400 ssh\/my_private_key pern<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297027[]' id='answer-id-1165494' class='answer   answerof-297027 ' value='1165494'   \/><label for='answer-id-1165494' id='answer-label-1165494' class=' answer'><span>chmod 0004 ssh\/my_private_key pern<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297027[]' id='answer-id-1165495' class='answer   answerof-297027 ' value='1165495'   \/><label for='answer-id-1165495' id='answer-label-1165495' class=' answer'><span>chmod 0777 ssh\/my_private_key pern<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-7' style=';'><div id='questionWrap-7'  class='   watupro-question-id-297028'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>7. <\/span>A company deploys a set of standard IAM roles in AWS accounts. The IAM roles are based on job functions within the company. To balance operational efficiency and security, a security engineer implemented AWS Organizations SCPs to restrict access to critical security services in all company accounts. <br \/>\r<br>All of the company's accounts and OUs within AWS Organizations have a default FullAWSAccess SCP that is attached. The security engineer needs to ensure that no one can disable Amazon GuardDuty and AWS Security Hub. The security engineer also must not override other permissions that are granted by IAM policies that are defined in the accounts. <br \/>\r<br>Which SCP should the security engineer attach to the root of the organization to meet these requirements? <br \/>\r<br>A) <br \/>\r<br><br><img decoding=\"async\" width=382 height=265 id=\"\u56fe\u7247 64\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image001-34.jpg\"><br><br \/>\r<br>B) <br \/>\r<br><br><img decoding=\"async\" width=382 height=371 id=\"\u56fe\u7247 63\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image002-36.jpg\"><br><br \/>\r<br>C) <br \/>\r<br><br><img decoding=\"async\" width=382 height=371 id=\"\u56fe\u7247 62\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image003-35.jpg\"><br><br \/>\r<br>D) <br \/>\r<br><br><img decoding=\"async\" width=382 height=281 id=\"\u56fe\u7247 61\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image004-34.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_7' value='297028' \/><input type='hidden' id='answerType297028' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297028[]' id='answer-id-1165496' class='answer   answerof-297028 ' value='1165496'   \/><label for='answer-id-1165496' id='answer-label-1165496' class=' answer'><span>Option A<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297028[]' id='answer-id-1165497' class='answer   answerof-297028 ' value='1165497'   \/><label for='answer-id-1165497' id='answer-label-1165497' class=' answer'><span>Option B<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297028[]' id='answer-id-1165498' class='answer   answerof-297028 ' value='1165498'   \/><label for='answer-id-1165498' id='answer-label-1165498' class=' answer'><span>Option C<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297028[]' id='answer-id-1165499' class='answer   answerof-297028 ' value='1165499'   \/><label for='answer-id-1165499' id='answer-label-1165499' class=' answer'><span>Option D<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-8' style=';'><div id='questionWrap-8'  class='   watupro-question-id-297029'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>8. <\/span>A company is building a data processing application mat uses AWS Lambda functions. The application's Lambda functions need to communicate with an Amazon RDS OB instance that is deployed within a VPC in the same AWS account <br \/>\r<br>Which solution meets these requirements in the MOST secure way?<\/div><input type='hidden' name='question_id[]' id='qID_8' value='297029' \/><input type='hidden' id='answerType297029' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297029[]' id='answer-id-1165500' class='answer   answerof-297029 ' value='1165500'   \/><label for='answer-id-1165500' id='answer-label-1165500' class=' answer'><span>Configure the DB instance to allow public access Update the DB instance security group to allow access from the Lambda public address space for the AWS Region<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297029[]' id='answer-id-1165501' class='answer   answerof-297029 ' value='1165501'   \/><label for='answer-id-1165501' id='answer-label-1165501' class=' answer'><span>Deploy the Lambda functions inside the VPC Attach a network ACL to the Lambda subnet Provide outbound rule access to the VPC CIDR range only Update the DB instance security group to allow traffic from 0.0.0.0\/0<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297029[]' id='answer-id-1165502' class='answer   answerof-297029 ' value='1165502'   \/><label for='answer-id-1165502' id='answer-label-1165502' class=' answer'><span>Deploy the Lambda functions inside the VPC Attach a security group to the Lambda functions Provide outbound rule access to the VPC CIDR range only Update the DB instance security group to allow traffic from the Lambda security group<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297029[]' id='answer-id-1165503' class='answer   answerof-297029 ' value='1165503'   \/><label for='answer-id-1165503' id='answer-label-1165503' class=' answer'><span>Peer the Lambda default VPC with the VPC that hosts the DB instance to allow direct network access without the need for security groups<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-9' style=';'><div id='questionWrap-9'  class='   watupro-question-id-297030'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>9. <\/span>A company has an application that uses an Amazon RDS PostgreSQL database. The company is developing an application feature that will store sensitive information for an individual in the database. <br \/>\r<br>During a security review of the environment, the company discovers that the RDS DB instance is not encrypting data at rest. The company needs a solution that will provide encryption at rest for all the existing data and for any new data that is entered for an individual. <br \/>\r<br>Which combination of options can the company use to meet these requirements? (Select TWO.)<\/div><input type='hidden' name='question_id[]' id='qID_9' value='297030' \/><input type='hidden' id='answerType297030' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297030[]' id='answer-id-1165504' class='answer   answerof-297030 ' value='1165504'   \/><label for='answer-id-1165504' id='answer-label-1165504' class=' answer'><span>Create a snapshot of the DB instance. Copy the snapshot to a new snapshot, and enable encryption for the copy process. Use the new snapshot to restore the DB instance.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297030[]' id='answer-id-1165505' class='answer   answerof-297030 ' value='1165505'   \/><label for='answer-id-1165505' id='answer-label-1165505' class=' answer'><span>Modify the configuration of the DB instance by enabling encryption. Create a snapshot of the DB instance. Use the snapshot to restore the DB instance.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297030[]' id='answer-id-1165506' class='answer   answerof-297030 ' value='1165506'   \/><label for='answer-id-1165506' id='answer-label-1165506' class=' answer'><span>Use IAM Key Management Service (IAM KMS) to create a new default IAM managed awards key. Select this key as the encryption key for operations with Amazon RD<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297030[]' id='answer-id-1165507' class='answer   answerof-297030 ' value='1165507'   \/><label for='answer-id-1165507' id='answer-label-1165507' class=' answer'><span>Use IAM Key Management Service (IAM KMS] to create a new CM<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297030[]' id='answer-id-1165508' class='answer   answerof-297030 ' value='1165508'   \/><label for='answer-id-1165508' id='answer-label-1165508' class=' answer'><span>Select this key as the encryption key for operations with Amazon RD<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297030[]' id='answer-id-1165509' class='answer   answerof-297030 ' value='1165509'   \/><label for='answer-id-1165509' id='answer-label-1165509' class=' answer'><span>Create a snapshot of the DB instance. Enable encryption on the snapshoVUse the snapshot to restore the DB instance.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-10' style=';'><div id='questionWrap-10'  class='   watupro-question-id-297031'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>10. <\/span>Which of the following bucket policies will ensure that objects being uploaded to a bucket called 'demo' are encrypted. <br \/>\r<br>A) <br \/>\r<br><br><img decoding=\"async\" width=295 height=343 id=\"\u56fe\u7247 60\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image005-33.jpg\"><br><br \/>\r<br>B) <br \/>\r<br><br><img decoding=\"async\" width=294 height=343 id=\"\u56fe\u7247 59\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image006-31.jpg\"><br><br \/>\r<br>C) <br \/>\r<br><br><img decoding=\"async\" width=221 height=255 id=\"\u56fe\u7247 58\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image007-31.jpg\"><br><br \/>\r<br>D) <br \/>\r<br><br><img decoding=\"async\" width=223 height=255 id=\"\u56fe\u7247 57\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image008-29.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_10' value='297031' \/><input type='hidden' id='answerType297031' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297031[]' id='answer-id-1165510' class='answer   answerof-297031 ' value='1165510'   \/><label for='answer-id-1165510' id='answer-label-1165510' class=' answer'><span>Option A<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297031[]' id='answer-id-1165511' class='answer   answerof-297031 ' value='1165511'   \/><label for='answer-id-1165511' id='answer-label-1165511' class=' answer'><span>Option B<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297031[]' id='answer-id-1165512' class='answer   answerof-297031 ' value='1165512'   \/><label for='answer-id-1165512' id='answer-label-1165512' class=' answer'><span>Option C<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297031[]' id='answer-id-1165513' class='answer   answerof-297031 ' value='1165513'   \/><label for='answer-id-1165513' id='answer-label-1165513' class=' answer'><span>Option D<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-11' style=';'><div id='questionWrap-11'  class='   watupro-question-id-297032'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>11. <\/span>A company uses AWS Organizations to manage a multi-account AWS environment in a single AWS Region. The organization's management account is named management-01. The company has turned on AWS Config in all accounts in the organization. The company has designated an account named security-01 as the delegated administrator for AWS Config. <br \/>\r<br>All accounts report the compliance status of each account's rules to the AWS Config delegated administrator account by using an AWS Config aggregator. Each account administrator can configure and manage the account's own AWS Config rules to handle each account's unique compliance requirements. <br \/>\r<br>A security engineer needs to implement a solution to automatically deploy a set of 10 AWS Config rules to all existing and future AWS accounts in the organization. The solution must turn on AWS Config automatically during account creation. <br \/>\r<br>Which combination of steps will meet these requirements? (Select TWO.)<\/div><input type='hidden' name='question_id[]' id='qID_11' value='297032' \/><input type='hidden' id='answerType297032' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297032[]' id='answer-id-1165514' class='answer   answerof-297032 ' value='1165514'   \/><label for='answer-id-1165514' id='answer-label-1165514' class=' answer'><span>Create an AWS CloudFormation template that contains the 1 0 required AVVS Config rules. Deploy the template by using CloudFormation StackSets in the security-01 account.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297032[]' id='answer-id-1165515' class='answer   answerof-297032 ' value='1165515'   \/><label for='answer-id-1165515' id='answer-label-1165515' class=' answer'><span>Create a conformance pack that contains the 10 required AWS Config rules. Deploy the conformance pack from the security-01 account.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297032[]' id='answer-id-1165516' class='answer   answerof-297032 ' value='1165516'   \/><label for='answer-id-1165516' id='answer-label-1165516' class=' answer'><span>Create a conformance pack that contains the 10 required AWS Config rules. Deploy the conformance pack from the management-01 account.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297032[]' id='answer-id-1165517' class='answer   answerof-297032 ' value='1165517'   \/><label for='answer-id-1165517' id='answer-label-1165517' class=' answer'><span>Create an AWS CloudFormation template that will activate AWS Config. De-ploy the template by using CloudFormation StackSets in the security-01 ac-count.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297032[]' id='answer-id-1165518' class='answer   answerof-297032 ' value='1165518'   \/><label for='answer-id-1165518' id='answer-label-1165518' class=' answer'><span>Create an AWS CloudFormation template that will activate AWS Config. De-ploy the template by using CloudFormation StackSets in the management-01 account.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-12' style=';'><div id='questionWrap-12'  class='   watupro-question-id-297033'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>12. <\/span>A company has two IAM accounts within IAM Organizations. In Account-1. Amazon EC2 Auto Scaling is launched using a service-linked role. In Account-2. Amazon EBS volumes are encrypted with an IAM KMS key A Security Engineer needs to ensure that the service-linked role can launch instances with these encrypted volumes <br \/>\r<br>Which combination of steps should the Security Engineer take in both accounts? (Select TWO.)<\/div><input type='hidden' name='question_id[]' id='qID_12' value='297033' \/><input type='hidden' id='answerType297033' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297033[]' id='answer-id-1165519' class='answer   answerof-297033 ' value='1165519'   \/><label for='answer-id-1165519' id='answer-label-1165519' class=' answer'><span>Allow Account-1 to access the KMS key in Account-2 using a key policy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297033[]' id='answer-id-1165520' class='answer   answerof-297033 ' value='1165520'   \/><label for='answer-id-1165520' id='answer-label-1165520' class=' answer'><span>Attach an IAM policy to the service-linked role in Account-1 that allows these actions CreateGrant. DescnbeKey, Encrypt, GenerateDataKey, Decrypt, and ReEncrypt<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297033[]' id='answer-id-1165521' class='answer   answerof-297033 ' value='1165521'   \/><label for='answer-id-1165521' id='answer-label-1165521' class=' answer'><span>Create a KMS grant for the service-linked role with these actions CreateGrant, DescnbeKey Encrypt GenerateDataKey Decrypt, and ReEncrypt<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297033[]' id='answer-id-1165522' class='answer   answerof-297033 ' value='1165522'   \/><label for='answer-id-1165522' id='answer-label-1165522' class=' answer'><span>Attach an IAM policy to the role attached to the EC2 instances with KMS actions and then allow Account-1 in the KMS key policy.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297033[]' id='answer-id-1165523' class='answer   answerof-297033 ' value='1165523'   \/><label for='answer-id-1165523' id='answer-label-1165523' class=' answer'><span>Attach an IAM policy to the user who is launching EC2 instances and allow the user to access the KMS key policy of Account-2.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-13' style=';'><div id='questionWrap-13'  class='   watupro-question-id-297034'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>13. <\/span>Which of the following are valid configurations for using SSL certificates with Amazon CloudFront? (Select THREE) <br \/>\r<br>A. Default AWS Certificate Manager certificate <br \/>\r<br>B. Custom SSL certificate stored in AWS KMS <br \/>\r<br>C. Default CloudFront certificate <br \/>\r<br>D. Custom SSL certificate stored in AWS Certificate Manager <br \/>\r<br>E. Default SSL certificate stored in AWS Secrets Manager <br \/>\r<br>F. Custom SSL certificate stored in AWS IAM<\/div><input type='hidden' name='question_id[]' id='qID_13' value='297034' \/><input type='hidden' id='answerType297034' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-297034[]' id='textarea_q_297034' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-14' style=';'><div id='questionWrap-14'  class='   watupro-question-id-297035'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>14. <\/span>A Security Engineer is troubleshooting an issue with a company's custom logging application. The application logs are written to an Amazon S3 bucket with event notifications enabled to send events lo an Amazon SNS topic. All logs are encrypted at rest using an IAM KMS CMK. The SNS topic is subscribed to an encrypted Amazon SQS queue. The logging application polls the queue for new messages that contain metadata about the S3 object. The application then reads the content of the object from the S3 bucket for indexing. <br \/>\r<br>The Logging team reported that Amazon CloudWatch metrics for the number of messages sent or received is showing zero. No togs are being received. <br \/>\r<br>What should the Security Engineer do to troubleshoot this issue? <br \/>\r<br>A) Add the following statement to the IAM managed CMKs: <br \/>\r<br><br><img decoding=\"async\" width=641 height=203 id=\"\u56fe\u7247 55\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image010-27.jpg\"><br><br \/>\r<br>B) Add the following statement to the CMK key policy: <br \/>\r<br><br><img decoding=\"async\" width=363 height=200 id=\"\u56fe\u7247 54\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image011-27.jpg\"><br><br \/>\r<br>C) Add the following statement to the CMK key policy: <br \/>\r<br><br><img decoding=\"async\" width=362 height=201 id=\"\u56fe\u7247 53\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image012-27.jpg\"><br><br \/>\r<br>D) Add the following statement to the CMK key policy: <br \/>\r<br><br><img decoding=\"async\" width=362 height=201 id=\"\u56fe\u7247 52\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image013-26.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_14' value='297035' \/><input type='hidden' id='answerType297035' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297035[]' id='answer-id-1165525' class='answer   answerof-297035 ' value='1165525'   \/><label for='answer-id-1165525' id='answer-label-1165525' class=' answer'><span>Option A<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297035[]' id='answer-id-1165526' class='answer   answerof-297035 ' value='1165526'   \/><label for='answer-id-1165526' id='answer-label-1165526' class=' answer'><span>Option B<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297035[]' id='answer-id-1165527' class='answer   answerof-297035 ' value='1165527'   \/><label for='answer-id-1165527' id='answer-label-1165527' class=' answer'><span>Option C<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297035[]' id='answer-id-1165528' class='answer   answerof-297035 ' value='1165528'   \/><label for='answer-id-1165528' id='answer-label-1165528' class=' answer'><span>Option D<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-15' style=';'><div id='questionWrap-15'  class='   watupro-question-id-297036'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>15. <\/span>A security engineer needs to implement a write-once-read-many (WORM) model for data that a company will store in Amazon S3 buckets. The company uses the S3 Standard storage class for all of its S3 buckets. The security engineer must ensure that objects cannot be overwritten or deleted by any user, including the AWS account root user. <br \/>\r<br>Which solution will meet these requirements?<\/div><input type='hidden' name='question_id[]' id='qID_15' value='297036' \/><input type='hidden' id='answerType297036' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297036[]' id='answer-id-1165529' class='answer   answerof-297036 ' value='1165529'   \/><label for='answer-id-1165529' id='answer-label-1165529' class=' answer'><span>Create new S3 buckets with S3 Object Lock enabled in compliance mode. Place objects in the S3 \r\nbuckets.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297036[]' id='answer-id-1165530' class='answer   answerof-297036 ' value='1165530'   \/><label for='answer-id-1165530' id='answer-label-1165530' class=' answer'><span>Use S3 Glacier Vault Lock to attach a Vault Lock policy to new S3 buckets. Wait 24 hours to complete the Vault Lock process. Place objects in the S3 buckets.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297036[]' id='answer-id-1165531' class='answer   answerof-297036 ' value='1165531'   \/><label for='answer-id-1165531' id='answer-label-1165531' class=' answer'><span>Create new S3 buckets with S3 Object Lock enabled in governance mode. Place objects in the S3 buckets.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297036[]' id='answer-id-1165532' class='answer   answerof-297036 ' value='1165532'   \/><label for='answer-id-1165532' id='answer-label-1165532' class=' answer'><span>Create new S3 buckets with S3 Object Lock enabled in governance mode. Add a legal hold to the S3 buckets. Place objects in the S3 buckets.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-16' style=';'><div id='questionWrap-16'  class='   watupro-question-id-297037'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>16. <\/span>A development team is attempting to encrypt and decode a secure string parameter from the IAM Systems Manager Parameter Store using an IAM Key Management Service (IAM KMS) CMK. However, each attempt results in an error message being sent to the development team. <br \/>\r<br>Which CMK-related problems possibly account for the error? (Select two.)<\/div><input type='hidden' name='question_id[]' id='qID_16' value='297037' \/><input type='hidden' id='answerType297037' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297037[]' id='answer-id-1165533' class='answer   answerof-297037 ' value='1165533'   \/><label for='answer-id-1165533' id='answer-label-1165533' class=' answer'><span>The CMK is used in the attempt does not exist.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297037[]' id='answer-id-1165534' class='answer   answerof-297037 ' value='1165534'   \/><label for='answer-id-1165534' id='answer-label-1165534' class=' answer'><span>The CMK is used in the attempt needs to be rotated.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297037[]' id='answer-id-1165535' class='answer   answerof-297037 ' value='1165535'   \/><label for='answer-id-1165535' id='answer-label-1165535' class=' answer'><span>The CMK is used in the attempt is using the CMK&#8482;s key ID instead of the CMK AR<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297037[]' id='answer-id-1165536' class='answer   answerof-297037 ' value='1165536'   \/><label for='answer-id-1165536' id='answer-label-1165536' class=' answer'><span>The CMK is used in the attempt is not enabled.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297037[]' id='answer-id-1165537' class='answer   answerof-297037 ' value='1165537'   \/><label for='answer-id-1165537' id='answer-label-1165537' class=' answer'><span>The CMK is used in the attempt is using an alias.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-17' style=';'><div id='questionWrap-17'  class='   watupro-question-id-297038'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>17. <\/span>A security engineer logs in to the AWS Lambda console with administrator permissions. The security engineer is trying to view logs in Amazon CloudWatch for a Lambda function that is named my Function. <br \/>\r<br>When the security engineer chooses the option in the Lambda console to view logs in CloudWatch, an \u201cerror loading Log Streams&quot; message appears. <br \/>\r<br>The IAM policy for the Lambda function's execution role contains the following: <br \/>\r<br><br><img decoding=\"async\" width=638 height=232 id=\"\u56fe\u7247 51\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image014-25.jpg\"><br><br \/>\r<br>How should the security engineer correct the error?<\/div><input type='hidden' name='question_id[]' id='qID_17' value='297038' \/><input type='hidden' id='answerType297038' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297038[]' id='answer-id-1165538' class='answer   answerof-297038 ' value='1165538'   \/><label for='answer-id-1165538' id='answer-label-1165538' class=' answer'><span>Move the logs:CreateLogGroup action to the second Allow statement.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297038[]' id='answer-id-1165539' class='answer   answerof-297038 ' value='1165539'   \/><label for='answer-id-1165539' id='answer-label-1165539' class=' answer'><span>Add the logs:PutDestination action to the second Allow statement.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297038[]' id='answer-id-1165540' class='answer   answerof-297038 ' value='1165540'   \/><label for='answer-id-1165540' id='answer-label-1165540' class=' answer'><span>Add the logs:GetLogEvents action to the second Allow statement.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297038[]' id='answer-id-1165541' class='answer   answerof-297038 ' value='1165541'   \/><label for='answer-id-1165541' id='answer-label-1165541' class=' answer'><span>Add the logs:CreateLogStream action to the second Allow statement.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-18' style=';'><div id='questionWrap-18'  class='   watupro-question-id-297039'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>18. <\/span>A company plans to create individual child accounts within an existing organization in IAM Organizations for each of its DevOps teams. IAM CloudTrail has been enabled and configured on all accounts to write audit logs to an Amazon S3 bucket in a centralized IAM account. A security engineer needs to ensure that DevOps team members are unable to modify or disable this configuration. <br \/>\r<br>How can the security engineer meet these requirements?<\/div><input type='hidden' name='question_id[]' id='qID_18' value='297039' \/><input type='hidden' id='answerType297039' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297039[]' id='answer-id-1165542' class='answer   answerof-297039 ' value='1165542'   \/><label for='answer-id-1165542' id='answer-label-1165542' class=' answer'><span>Create an IAM policy that prohibits changes to the specific CloudTrail trail and apply the policy to the IAM account root user.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297039[]' id='answer-id-1165543' class='answer   answerof-297039 ' value='1165543'   \/><label for='answer-id-1165543' id='answer-label-1165543' class=' answer'><span>Create an S3 bucket policy in the specified destination account for the CloudTrail trail that prohibits configuration changes from the IAM account root user in the source account.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297039[]' id='answer-id-1165544' class='answer   answerof-297039 ' value='1165544'   \/><label for='answer-id-1165544' id='answer-label-1165544' class=' answer'><span>Create an SCP that prohibits changes to the specific CloudTrail trail and apply the SCP to the appropriate organizational unit or account in Organizations.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297039[]' id='answer-id-1165545' class='answer   answerof-297039 ' value='1165545'   \/><label for='answer-id-1165545' id='answer-label-1165545' class=' answer'><span>Create an IAM policy that prohibits changes to the specific CloudTrail trail and apply the policy to a \r\nnew IAM group. Have team members use individual IAM accounts that are members of the new IAM group.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-19' style=';'><div id='questionWrap-19'  class='   watupro-question-id-297040'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>19. <\/span>A company uses Amazon RDS for MySQL as a database engine for its applications. A recent security audit revealed an RDS instance that is not compliant with company policy for encrypting data at rest. A security engineer at the company needs to ensure that all existing RDS databases are encrypted using server-side encryption and that any future deviations from the policy are detected. <br \/>\r<br>Which combination of steps should the security engineer take to accomplish this? (Select TWO.)<\/div><input type='hidden' name='question_id[]' id='qID_19' value='297040' \/><input type='hidden' id='answerType297040' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297040[]' id='answer-id-1165546' class='answer   answerof-297040 ' value='1165546'   \/><label for='answer-id-1165546' id='answer-label-1165546' class=' answer'><span>Create an IAM Config rule to detect the creation of unencrypted RDS databases. Create an Amazon EventBridge (Amazon CloudWatch Events) rule to trigger on the IAM Config rules compliance state change and use Amazon Simple Notification Service (Amazon SNS) to notify the security operations team.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297040[]' id='answer-id-1165547' class='answer   answerof-297040 ' value='1165547'   \/><label for='answer-id-1165547' id='answer-label-1165547' class=' answer'><span>Use IAM System Manager State Manager to detect RDS database encryption configuration drift. Create an Amazon EventBridge (Amazon CloudWatch Events) rule to track state changes and use Amazon Simple Notification Service (Amazon SNS) to notify the security operations team.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297040[]' id='answer-id-1165548' class='answer   answerof-297040 ' value='1165548'   \/><label for='answer-id-1165548' id='answer-label-1165548' class=' answer'><span>Create a read replica for the existing unencrypted RDS database and enable replica encryption in the process. Once the replica becomes active, promote it into a standalone database instance and terminate the unencrypted database instance.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297040[]' id='answer-id-1165549' class='answer   answerof-297040 ' value='1165549'   \/><label for='answer-id-1165549' id='answer-label-1165549' class=' answer'><span>Take a snapshot of the unencrypted RDS database. Copy the snapshot and enable snapshot encryption in the process. Restore the database instance from the newly created encrypted snapshot. Terminate the unencrypted database instance.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297040[]' id='answer-id-1165550' class='answer   answerof-297040 ' value='1165550'   \/><label for='answer-id-1165550' id='answer-label-1165550' class=' answer'><span>Enable encryption for the identified unencrypted RDS instance by changing the configurations of the existing database<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-20' style=';'><div id='questionWrap-20'  class='   watupro-question-id-297041'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>20. <\/span>A company has a large fleet of Linux Amazon EC2 instances and Windows EC2 instances that run in private subnets. The company wants all remote administration to be performed as securely as possible in the AWS Cloud. <br \/>\r<br>Which solution will meet these requirements?<\/div><input type='hidden' name='question_id[]' id='qID_20' value='297041' \/><input type='hidden' id='answerType297041' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297041[]' id='answer-id-1165551' class='answer   answerof-297041 ' value='1165551'   \/><label for='answer-id-1165551' id='answer-label-1165551' class=' answer'><span>Do not use SSH-RSA private keys during the launch of new instances. Implement AWS Systems Manager Session Manager.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297041[]' id='answer-id-1165552' class='answer   answerof-297041 ' value='1165552'   \/><label for='answer-id-1165552' id='answer-label-1165552' class=' answer'><span>Generate new SSH-RSA private keys for existing instances. Implement AWS Systems Manager Session Manager.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297041[]' id='answer-id-1165553' class='answer   answerof-297041 ' value='1165553'   \/><label for='answer-id-1165553' id='answer-label-1165553' class=' answer'><span>Do not use SSH-RSA private keys during the launch of new instances. Configure EC2 Instance Connect.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297041[]' id='answer-id-1165554' class='answer   answerof-297041 ' value='1165554'   \/><label for='answer-id-1165554' id='answer-label-1165554' class=' answer'><span>Generate new SSH-RSA private keys for existing instances. Configure EC2 Instance Connect.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-21' style=';'><div id='questionWrap-21'  class='   watupro-question-id-297042'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>21. <\/span>A company has an AWS Lambda function that creates image thumbnails from larger images. The Lambda function needs read and write access to an Amazon S3 bucket in the same AWS account. <br \/>\r<br>Which solutions will provide the Lambda function this access? (Select TWO.)<\/div><input type='hidden' name='question_id[]' id='qID_21' value='297042' \/><input type='hidden' id='answerType297042' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297042[]' id='answer-id-1165555' class='answer   answerof-297042 ' value='1165555'   \/><label for='answer-id-1165555' id='answer-label-1165555' class=' answer'><span>Create an IAM user that has only programmatic access. Create a new access key pair. Add environmental variables to the Lambda function with the access key ID and secret access key. Modify the Lambda function to use the environmental variables at run time during communication with Amazon S3.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297042[]' id='answer-id-1165556' class='answer   answerof-297042 ' value='1165556'   \/><label for='answer-id-1165556' id='answer-label-1165556' class=' answer'><span>Generate an Amazon EC2 key pair. Store the private key in AWS Secrets Man-ager. Modify the Lambda function to retrieve the private key from Secrets Manager and to use the private key during communication with Amazon S3.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297042[]' id='answer-id-1165557' class='answer   answerof-297042 ' value='1165557'   \/><label for='answer-id-1165557' id='answer-label-1165557' class=' answer'><span>Create an IAM role for the Lambda function. Attach an IAM policy that al-lows access to the S3 bucket.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297042[]' id='answer-id-1165558' class='answer   answerof-297042 ' value='1165558'   \/><label for='answer-id-1165558' id='answer-label-1165558' class=' answer'><span>Create an IAM role for the Lambda function. Attach a bucket policy to the S3 bucket to allow access. Specify the function's IAM role as the principal.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297042[]' id='answer-id-1165559' class='answer   answerof-297042 ' value='1165559'   \/><label for='answer-id-1165559' id='answer-label-1165559' class=' answer'><span>Create a security group. Attach the security group to the Lambda function. Attach a bucket policy that allows access to the S3 bucket through the security group I<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-22' style=';'><div id='questionWrap-22'  class='   watupro-question-id-297043'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>22. <\/span>A security engineer is designing an IAM policy for a script that will use the AWS CLI. The script currently assumes an IAM role that is attached to three AWS managed IAM policies: AmazonEC2FullAccess, AmazonDynamoDBFullAccess, and Ama-zonVPCFull Access. <br \/>\r<br>The security engineer needs to construct a least privilege IAM policy that will replace the AWS managed IAM policies that are attached to this role. <br \/>\r<br>Which solution will meet these requirements in the MOST operationally efficient way?<\/div><input type='hidden' name='question_id[]' id='qID_22' value='297043' \/><input type='hidden' id='answerType297043' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297043[]' id='answer-id-1165560' class='answer   answerof-297043 ' value='1165560'   \/><label for='answer-id-1165560' id='answer-label-1165560' class=' answer'><span>In AWS CloudTrail, create a trail for management events. Run the script with the existing AWS managed IAM policies. Use IAM Access Analyzer to generate a new IAM policy that is based on access activity in the trail. Replace the existing AWS managed IAM policies with the generated IAM poli-cy for the role.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297043[]' id='answer-id-1165561' class='answer   answerof-297043 ' value='1165561'   \/><label for='answer-id-1165561' id='answer-label-1165561' class=' answer'><span>Remove the existing AWS managed IAM policies from the role. Attach the IAM Access Analyzer Role Policy Generator to the role. Run the script. Return to IAM Access Analyzer and generate a least privilege IAM policy. Attach the new IAM policy to the role.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297043[]' id='answer-id-1165562' class='answer   answerof-297043 ' value='1165562'   \/><label for='answer-id-1165562' id='answer-label-1165562' class=' answer'><span>Create an account analyzer in IAM Access Analyzer. Create an archive rule that has a filter that checks whether the Principal Arn value matches the ARN of the role. Run the script. Remove the existing AWS managed IAM policies from the role.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297043[]' id='answer-id-1165563' class='answer   answerof-297043 ' value='1165563'   \/><label for='answer-id-1165563' id='answer-label-1165563' class=' answer'><span>In AWS CloudTrail, create a trail for management events. Remove the existing AWS managed IAM policies from the role. Run the script. Find the authorization failure in the trail event that is associated with the script. Create a new IAM policy that includes the action and resource that caused the authorization failure. Repeat the process until the script succeeds. Attach the new IAM policy to the role.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-23' style=';'><div id='questionWrap-23'  class='   watupro-question-id-297044'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>23. <\/span>A company that uses AWS Organizations wants to see AWS Security Hub findings for many AWS accounts and AWS Regions. Some of the accounts are in the company's organization, and some accounts are in organizations that the company manages for customers. Although the company can see findings in the Security Hub administrator account for accounts in the company's organization, there are no findings from accounts in other organizations. <br \/>\r<br>Which combination of steps should the company take to see findings from accounts that are outside the organization that includes the Security Hub administrator account? (Select TWO.)<\/div><input type='hidden' name='question_id[]' id='qID_23' value='297044' \/><input type='hidden' id='answerType297044' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297044[]' id='answer-id-1165564' class='answer   answerof-297044 ' value='1165564'   \/><label for='answer-id-1165564' id='answer-label-1165564' class=' answer'><span>Use a designated administration account to automatically set up member accounts.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297044[]' id='answer-id-1165565' class='answer   answerof-297044 ' value='1165565'   \/><label for='answer-id-1165565' id='answer-label-1165565' class=' answer'><span>Create the AWS Service Role ForSecurrty Hub service-linked rote for Security Hub.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297044[]' id='answer-id-1165566' class='answer   answerof-297044 ' value='1165566'   \/><label for='answer-id-1165566' id='answer-label-1165566' class=' answer'><span>Send an administration request from the member accounts.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297044[]' id='answer-id-1165567' class='answer   answerof-297044 ' value='1165567'   \/><label for='answer-id-1165567' id='answer-label-1165567' class=' answer'><span>Enable Security Hub for all member accounts.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297044[]' id='answer-id-1165568' class='answer   answerof-297044 ' value='1165568'   \/><label for='answer-id-1165568' id='answer-label-1165568' class=' answer'><span>Send invitations to accounts that are outside the company's organization from the Security Hub administrator account.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-24' style=';'><div id='questionWrap-24'  class='   watupro-question-id-297045'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>24. <\/span>A company uses identity federation to authenticate users into an identity account (987654321987) where the users assume an IAM role named IdentityRole. The users then assume an IAM role named JobFunctionRole in the target IAM account (123456789123) to perform their job functions. <br \/>\r<br>A user is unable to assume the IAM role in the target account. <br \/>\r<br>The policy attached to the role in the identity account is: <br \/>\r<br><br><img decoding=\"async\" width=504 height=285 id=\"\u56fe\u7247 50\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image015-25.jpg\"><br><br \/>\r<br>What should be done to enable the user to assume the appropriate role in the target account? <br \/>\r<br><br><img decoding=\"async\" width=642 height=306 id=\"\u56fe\u7247 49\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image016-25.jpg\"><br><br \/>\r<br><br><img decoding=\"async\" width=650 height=525 id=\"\u56fe\u7247 48\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image017-25.jpg\"><br><br \/>\r<br><br><img decoding=\"async\" width=649 height=219 id=\"\u56fe\u7247 47\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image018-25.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_24' value='297045' \/><input type='hidden' id='answerType297045' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297045[]' id='answer-id-1165569' class='answer   answerof-297045 ' value='1165569'   \/><label for='answer-id-1165569' id='answer-label-1165569' class=' answer'><span>Option A<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297045[]' id='answer-id-1165570' class='answer   answerof-297045 ' value='1165570'   \/><label for='answer-id-1165570' id='answer-label-1165570' class=' answer'><span>Option B<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297045[]' id='answer-id-1165571' class='answer   answerof-297045 ' value='1165571'   \/><label for='answer-id-1165571' id='answer-label-1165571' class=' answer'><span>Option C<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297045[]' id='answer-id-1165572' class='answer   answerof-297045 ' value='1165572'   \/><label for='answer-id-1165572' id='answer-label-1165572' class=' answer'><span>Option D<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-25' style=';'><div id='questionWrap-25'  class='   watupro-question-id-297046'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>25. <\/span>A company hosts a web application on an Apache web server. The application runs on Amazon EC2 instances that are in an Auto Scaling group. The company configured the EC2 instances to send the Apache web server logs to an Amazon CloudWatch Logs group that the company has configured to expire after 1 year. <br \/>\r<br>Recently, the company discovered in the Apache web server logs that a specific IP address is sending suspicious requests to the web application. A security engineer wants to analyze the past week of Apache web server logs to determine how many requests that the IP address sent and the corresponding URLs that the IP address requested. <br \/>\r<br>What should the security engineer do to meet these requirements with the LEAST effort?<\/div><input type='hidden' name='question_id[]' id='qID_25' value='297046' \/><input type='hidden' id='answerType297046' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297046[]' id='answer-id-1165573' class='answer   answerof-297046 ' value='1165573'   \/><label for='answer-id-1165573' id='answer-label-1165573' class=' answer'><span>Export the CloudWatch Logs group data to Amazon S3. Use Amazon Macie to query the logs for the specific IP address and the requested URLs.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297046[]' id='answer-id-1165574' class='answer   answerof-297046 ' value='1165574'   \/><label for='answer-id-1165574' id='answer-label-1165574' class=' answer'><span>Configure a CloudWatch Logs subscription to stream the log group to an Amazon OpenSearch Service cluster. Use OpenSearch Service to analyze the logs for the specific IP address and the requested URLs.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297046[]' id='answer-id-1165575' class='answer   answerof-297046 ' value='1165575'   \/><label for='answer-id-1165575' id='answer-label-1165575' class=' answer'><span>Use CloudWatch Logs Insights and a custom query syntax to analyze the CloudWatch logs for the specific IP address and the requested URLs.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297046[]' id='answer-id-1165576' class='answer   answerof-297046 ' value='1165576'   \/><label for='answer-id-1165576' id='answer-label-1165576' class=' answer'><span>Export the CloudWatch Logs group data to Amazon S3. Use AWS Glue to crawl the S3 bucket for only the log entries that contain the specific IP ad-dress. Use AWS Glue to view the results.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-26' style=';'><div id='questionWrap-26'  class='   watupro-question-id-297047'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>26. <\/span>A company has multiple Amazon S3 buckets encrypted with customer-managed CMKs Due to regulatory requirements the keys must be rotated every year. The company's Security Engineer has enabled automatic key rotation for the CMKs; however the company wants to verity that the rotation has occurred. <br \/>\r<br>What should the Security Engineer do to accomplish this?<\/div><input type='hidden' name='question_id[]' id='qID_26' value='297047' \/><input type='hidden' id='answerType297047' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297047[]' id='answer-id-1165577' class='answer   answerof-297047 ' value='1165577'   \/><label for='answer-id-1165577' id='answer-label-1165577' class=' answer'><span>Filter IAM CloudTrail logs for KeyRotaton events<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297047[]' id='answer-id-1165578' class='answer   answerof-297047 ' value='1165578'   \/><label for='answer-id-1165578' id='answer-label-1165578' class=' answer'><span>Monitor Amazon CloudWatcn Events for any IAM KMS CMK rotation events<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297047[]' id='answer-id-1165579' class='answer   answerof-297047 ' value='1165579'   \/><label for='answer-id-1165579' id='answer-label-1165579' class=' answer'><span>Using the IAM CL<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297047[]' id='answer-id-1165580' class='answer   answerof-297047 ' value='1165580'   \/><label for='answer-id-1165580' id='answer-label-1165580' class=' answer'><span>run the IAM kms gel-key-relation-status operation with the --key-id parameter to check the CMK rotation date<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297047[]' id='answer-id-1165581' class='answer   answerof-297047 ' value='1165581'   \/><label for='answer-id-1165581' id='answer-label-1165581' class=' answer'><span>Use Amazon Athena to query IAM CloudTrail logs saved in an S3 bucket to filter Generate New Key events<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-27' style=';'><div id='questionWrap-27'  class='   watupro-question-id-297048'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>27. <\/span>A company has implemented IAM WAF and Amazon CloudFront for an application. The application runs on Amazon EC2 instances that are part of an Auto Scaling group. The Auto Scaling group is behind an Application Load Balancer (ALB). <br \/>\r<br>The IAM WAF web ACL uses an IAM Managed Rules rule group and is associated with the CloudFront distribution. CloudFront receives the request from IAM WAF and then uses the ALB as the distribution's origin. <br \/>\r<br>During a security review, a security engineer discovers that the infrastructure is susceptible to a large, layer 7 DDoS attack. <br \/>\r<br>How can the security engineer improve the security at the edge of the solution to defend against this type of attack?<\/div><input type='hidden' name='question_id[]' id='qID_27' value='297048' \/><input type='hidden' id='answerType297048' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297048[]' id='answer-id-1165582' class='answer   answerof-297048 ' value='1165582'   \/><label for='answer-id-1165582' id='answer-label-1165582' class=' answer'><span>Configure the CloudFront distribution to use the Lambda@Edge feature. Create an IAM Lambda function that imposes a rate limit on CloudFront viewer requests. Block the request if the rate limit is exceeded.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297048[]' id='answer-id-1165583' class='answer   answerof-297048 ' value='1165583'   \/><label for='answer-id-1165583' id='answer-label-1165583' class=' answer'><span>Configure the IAM WAF web ACL so that the web ACL has more capacity units to process all IAM WAF rules faster.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297048[]' id='answer-id-1165584' class='answer   answerof-297048 ' value='1165584'   \/><label for='answer-id-1165584' id='answer-label-1165584' class=' answer'><span>Configure IAM WAF with a rate-based rule that imposes a rate limit that automatically blocks requests when the rate limit is exceeded.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297048[]' id='answer-id-1165585' class='answer   answerof-297048 ' value='1165585'   \/><label for='answer-id-1165585' id='answer-label-1165585' class=' answer'><span>Configure the CloudFront distribution to use IAM WAF as its origin instead of the AL<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-28' style=';'><div id='questionWrap-28'  class='   watupro-question-id-297049'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>28. <\/span>A company has multiple accounts in the AWS Cloud. Users in the developer account need to have access to specific resources in the production account. <br \/>\r<br>What is the MOST secure way to provide this access?<\/div><input type='hidden' name='question_id[]' id='qID_28' value='297049' \/><input type='hidden' id='answerType297049' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297049[]' id='answer-id-1165586' class='answer   answerof-297049 ' value='1165586'   \/><label for='answer-id-1165586' id='answer-label-1165586' class=' answer'><span>Create one IAM user in the production account. Grant the appropriate permissions to the resources that are needed. Share the password only with the users that need access.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297049[]' id='answer-id-1165587' class='answer   answerof-297049 ' value='1165587'   \/><label for='answer-id-1165587' id='answer-label-1165587' class=' answer'><span>Create cross account access with an IAM role in the developer account. Grant the appropriate permissions to this role. Allow users in the developer account to assume this role to access the production resources.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297049[]' id='answer-id-1165588' class='answer   answerof-297049 ' value='1165588'   \/><label for='answer-id-1165588' id='answer-label-1165588' class=' answer'><span>Create cross-account access with an IAM user account in the production account. Grant the appropriate permissions to this user account. Allow users in the developer account to use this user account to access the production resources.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297049[]' id='answer-id-1165589' class='answer   answerof-297049 ' value='1165589'   \/><label for='answer-id-1165589' id='answer-label-1165589' class=' answer'><span>Create cross-account access with an IAM role in the production account. Grant the appropriate permissions to this role. Allow users in the developer account to assume this role to access the production resources.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-29' style=';'><div id='questionWrap-29'  class='   watupro-question-id-297050'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>29. <\/span>A System Administrator is unable to start an Amazon EC2 instance in the eu-west-1 Region using an IAM role The same System Administrator is able to start an EC2 instance in the eu-west-2 and eu-west-3 Regions. The IAMSystemAdministrator access policy attached to the System Administrator IAM role allows unconditional access to all IAM services and resources within the account <br \/>\r<br>Which configuration caused this issue? <br \/>\r<br>A) An SCP is attached to the account with the following permission statement: <br \/>\r<br><br><img decoding=\"async\" width=390 height=619 id=\"\u56fe\u7247 46\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image019-25.jpg\"><br><br \/>\r<br>B) A permission boundary policy is attached to the System Administrator role with the following permission statement: <br \/>\r<br><br><img decoding=\"async\" width=389 height=683 id=\"\u56fe\u7247 45\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image020-25.jpg\"><br><br \/>\r<br>C) A permission boundary is attached to the System Administrator role with the following permission statement: <br \/>\r<br><br><img decoding=\"async\" width=231 height=294 id=\"\u56fe\u7247 44\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image021-24.jpg\"><br><br \/>\r<br>D) An SCP is attached to the account with the following statement: <br \/>\r<br><br><img decoding=\"async\" width=233 height=342 id=\"\u56fe\u7247 43\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image022-24.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_29' value='297050' \/><input type='hidden' id='answerType297050' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297050[]' id='answer-id-1165590' class='answer   answerof-297050 ' value='1165590'   \/><label for='answer-id-1165590' id='answer-label-1165590' class=' answer'><span>Option A<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297050[]' id='answer-id-1165591' class='answer   answerof-297050 ' value='1165591'   \/><label for='answer-id-1165591' id='answer-label-1165591' class=' answer'><span>Option B<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297050[]' id='answer-id-1165592' class='answer   answerof-297050 ' value='1165592'   \/><label for='answer-id-1165592' id='answer-label-1165592' class=' answer'><span>Option C<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297050[]' id='answer-id-1165593' class='answer   answerof-297050 ' value='1165593'   \/><label for='answer-id-1165593' id='answer-label-1165593' class=' answer'><span>Option D<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-30' style=';'><div id='questionWrap-30'  class='   watupro-question-id-297051'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>30. <\/span>Amazon GuardDuty has detected communications to a known command and control endpoint from a company's Amazon EC2 instance. The instance was found to be running a vulnerable version of a common web framework. The company's security operations team wants to quickly identity other compute resources with the specific version of that framework installed. <br \/>\r<br>Which approach should the team take to accomplish this task?<\/div><input type='hidden' name='question_id[]' id='qID_30' value='297051' \/><input type='hidden' id='answerType297051' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297051[]' id='answer-id-1165594' class='answer   answerof-297051 ' value='1165594'   \/><label for='answer-id-1165594' id='answer-label-1165594' class=' answer'><span>Scan all the EC2 instances for noncompliance with IAM Config. Use Amazon Athena to query IAM CloudTrail logs for the framework installation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297051[]' id='answer-id-1165595' class='answer   answerof-297051 ' value='1165595'   \/><label for='answer-id-1165595' id='answer-label-1165595' class=' answer'><span>Scan all the EC2 instances with the Amazon Inspector Network Reachability rules package to identity instances running a web server with RecognizedPortWithListener findings<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297051[]' id='answer-id-1165596' class='answer   answerof-297051 ' value='1165596'   \/><label for='answer-id-1165596' id='answer-label-1165596' class=' answer'><span>Scan all the EC2 instances with IAM Systems Manager to identify the vulnerable version of the web framework<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297051[]' id='answer-id-1165597' class='answer   answerof-297051 ' value='1165597'   \/><label for='answer-id-1165597' id='answer-label-1165597' class=' answer'><span>Scan an the EC2 instances with IAM Resource Access Manager to identify the vulnerable version of the web framework<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-31' style=';'><div id='questionWrap-31'  class='   watupro-question-id-297052'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>31. <\/span>A developer is building a serverless application hosted on AWS that uses Amazon Redshift as a data store The application has separate modules for readwrite and read-only functionality The modules need their own database users for compliance reasons <br \/>\r<br>Which combination of steps should a security engineer implement to grant appropriate access? (Select TWO.)<\/div><input type='hidden' name='question_id[]' id='qID_31' value='297052' \/><input type='hidden' id='answerType297052' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297052[]' id='answer-id-1165598' class='answer   answerof-297052 ' value='1165598'   \/><label for='answer-id-1165598' id='answer-label-1165598' class=' answer'><span>Configure cluster security groups for each application module to control access to database users that are required for read-only and readwrite<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297052[]' id='answer-id-1165599' class='answer   answerof-297052 ' value='1165599'   \/><label for='answer-id-1165599' id='answer-label-1165599' class=' answer'><span>Configure a VPC endpoint for Amazon Redshift Configure an endpoint policy that maps database users to each application module, and allow access to the tables that are required for read-only and read\/write<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297052[]' id='answer-id-1165600' class='answer   answerof-297052 ' value='1165600'   \/><label for='answer-id-1165600' id='answer-label-1165600' class=' answer'><span>Configure an 1AM policy for each module Specify the ARN of an Amazon Redshift database user that allows the GetClusterCredentials API call<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297052[]' id='answer-id-1165601' class='answer   answerof-297052 ' value='1165601'   \/><label for='answer-id-1165601' id='answer-label-1165601' class=' answer'><span>Create local database users for each module<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297052[]' id='answer-id-1165602' class='answer   answerof-297052 ' value='1165602'   \/><label for='answer-id-1165602' id='answer-label-1165602' class=' answer'><span>Configure an 1AM policy for each module Specify the ARN of an 1AM user that allows the GetClusterCredentials API call<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-32' style=';'><div id='questionWrap-32'  class='   watupro-question-id-297053'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>32. <\/span>A company finds that one of its Amazon EC2 instances suddenly has a high CPU usage. The company does not know whether the EC2 instance is compromised or whether the operating system is performing background cleanup. <br \/>\r<br>Which combination of steps should a security engineer take before investigating the issue? (Select THREE.)<\/div><input type='hidden' name='question_id[]' id='qID_32' value='297053' \/><input type='hidden' id='answerType297053' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297053[]' id='answer-id-1165603' class='answer   answerof-297053 ' value='1165603'   \/><label for='answer-id-1165603' id='answer-label-1165603' class=' answer'><span>Disable termination protection for the EC2 instance if termination protection has not been disabled.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297053[]' id='answer-id-1165604' class='answer   answerof-297053 ' value='1165604'   \/><label for='answer-id-1165604' id='answer-label-1165604' class=' answer'><span>Enable termination protection for the EC2 instance if termination protection has not been enabled.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297053[]' id='answer-id-1165605' class='answer   answerof-297053 ' value='1165605'   \/><label for='answer-id-1165605' id='answer-label-1165605' class=' answer'><span>Take snapshots of the Amazon Elastic Block Store (Amazon EBS) data volumes that are attached to the EC2 instance.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297053[]' id='answer-id-1165606' class='answer   answerof-297053 ' value='1165606'   \/><label for='answer-id-1165606' id='answer-label-1165606' class=' answer'><span>Remove all snapshots of the Amazon Elastic Block Store (Amazon EBS) data volumes that are attached to the EC2 instance.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297053[]' id='answer-id-1165607' class='answer   answerof-297053 ' value='1165607'   \/><label for='answer-id-1165607' id='answer-label-1165607' class=' answer'><span>Capture the EC2 instance metadata, and then tag the EC2 instance as under quarantine.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297053[]' id='answer-id-1165608' class='answer   answerof-297053 ' value='1165608'   \/><label for='answer-id-1165608' id='answer-label-1165608' class=' answer'><span>Immediately remove any entries in the EC2 instance metadata that contain sensitive information.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-33' style=';'><div id='questionWrap-33'  class='   watupro-question-id-297054'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>33. <\/span>A company hosts an application on Amazon EC2 that is subject to specific rules for regulatory compliance. One rule states that traffic to and from the workload must be inspected for network-level attacks. This involves inspecting the whole packet. <br \/>\r<br>To comply with this regulatory rule, a security engineer must install intrusion detection software on a c5n.4xlarge EC2 instance. The engineer must then configure the software to monitor traffic to and from the application instances. <br \/>\r<br>What should the security engineer do next?<\/div><input type='hidden' name='question_id[]' id='qID_33' value='297054' \/><input type='hidden' id='answerType297054' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297054[]' id='answer-id-1165609' class='answer   answerof-297054 ' value='1165609'   \/><label for='answer-id-1165609' id='answer-label-1165609' class=' answer'><span>Place the network interface in promiscuous mode to capture the traffic.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297054[]' id='answer-id-1165610' class='answer   answerof-297054 ' value='1165610'   \/><label for='answer-id-1165610' id='answer-label-1165610' class=' answer'><span>Configure VPC Flow Logs to send traffic to the monitoring EC2 instance using a Network Load Balancer.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297054[]' id='answer-id-1165611' class='answer   answerof-297054 ' value='1165611'   \/><label for='answer-id-1165611' id='answer-label-1165611' class=' answer'><span>Configure VPC traffic mirroring to send traffic to the monitoring EC2 instance using a Network Load Balancer.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297054[]' id='answer-id-1165612' class='answer   answerof-297054 ' value='1165612'   \/><label for='answer-id-1165612' id='answer-label-1165612' class=' answer'><span>Use Amazon Inspector to detect network-level attacks and trigger an IAM Lambda function to send the suspicious packets to the EC2 instance.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-34' style=';'><div id='questionWrap-34'  class='   watupro-question-id-297055'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>34. <\/span>A company has a relational database workload that runs on Amazon Aurora MySQL. According to new compliance standards the company must rotate all database credentials every 30 days. The company needs a solution that maximizes security and minimizes development effort. <br \/>\r<br>Which solution will meet these requirements?<\/div><input type='hidden' name='question_id[]' id='qID_34' value='297055' \/><input type='hidden' id='answerType297055' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297055[]' id='answer-id-1165613' class='answer   answerof-297055 ' value='1165613'   \/><label for='answer-id-1165613' id='answer-label-1165613' class=' answer'><span>Store the database credentials in AWS Secrets Manager. Configure automatic credential rotation tor every 30 days.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297055[]' id='answer-id-1165614' class='answer   answerof-297055 ' value='1165614'   \/><label for='answer-id-1165614' id='answer-label-1165614' class=' answer'><span>Store the database credentials in AWS Systems Manager Parameter Store. Create an AWS Lambda function to rotate the credentials every 30 days.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297055[]' id='answer-id-1165615' class='answer   answerof-297055 ' value='1165615'   \/><label for='answer-id-1165615' id='answer-label-1165615' class=' answer'><span>Store the database credentials in an environment file or in a configuration file. Modify the credentials every 30 days.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297055[]' id='answer-id-1165616' class='answer   answerof-297055 ' value='1165616'   \/><label for='answer-id-1165616' id='answer-label-1165616' class=' answer'><span>Store the database credentials in an environment file or in a configuration file. Create an AWS Lambda function to rotate the credentials every 30 days.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-35' style=';'><div id='questionWrap-35'  class='   watupro-question-id-297056'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>35. <\/span>A company uses AWS Organizations to manage a small number of AWS accounts. However, the company plans to add 1 000 more accounts soon. The company allows only a centralized security team to create IAM roles for all AWS accounts and teams. Application teams submit requests for IAM roles to the security team. The security team has a backlog of IAM role requests and cannot review and provision the IAM roles quickly. <br \/>\r<br>The security team must create a process that will allow application teams to provision their own IAM roles. <br \/>\r<br>The process must also limit the scope of IAM roles and prevent privilege escalation. <br \/>\r<br>Which solution will meet these requirements with the LEAST operational overhead?<\/div><input type='hidden' name='question_id[]' id='qID_35' value='297056' \/><input type='hidden' id='answerType297056' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297056[]' id='answer-id-1165617' class='answer   answerof-297056 ' value='1165617'   \/><label for='answer-id-1165617' id='answer-label-1165617' class=' answer'><span>Create an IAM group for each application team. Associate policies with each IAM group. Provision IAM users for each application team member. Add the new IAM users to the appropriate IAM group by using role-based access control (RBAC).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297056[]' id='answer-id-1165618' class='answer   answerof-297056 ' value='1165618'   \/><label for='answer-id-1165618' id='answer-label-1165618' class=' answer'><span>Delegate application team leads to provision IAM rotes for each team. Conduct a quarterly review of the IAM rotes the team leads have provisioned. Ensure that the application team leads have the appropriate training to review IAM roles.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297056[]' id='answer-id-1165619' class='answer   answerof-297056 ' value='1165619'   \/><label for='answer-id-1165619' id='answer-label-1165619' class=' answer'><span>Put each AWS account in its own O<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297056[]' id='answer-id-1165620' class='answer   answerof-297056 ' value='1165620'   \/><label for='answer-id-1165620' id='answer-label-1165620' class=' answer'><span>Add an SCP to each OU to grant access to only the AWS services that the teams plan to use. Include conditions tn the AWS account of each team.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297056[]' id='answer-id-1165621' class='answer   answerof-297056 ' value='1165621'   \/><label for='answer-id-1165621' id='answer-label-1165621' class=' answer'><span>Create an SCP and a permissions boundary for IAM roles. Add the SCP to the root OU so that only roles that have the permissions boundary attached can create any new IAM roles.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-36' style=';'><div id='questionWrap-36'  class='   watupro-question-id-297057'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>36. <\/span>A company's security engineer is developing an incident response plan to detect suspicious activity in an AWS account for VPC hosted resources. The security engineer needs to provide visibility for as many AWS Regions as possible. <br \/>\r<br>Which combination of steps will meet these requirements MOST cost-effectively? (Select TWO.)<\/div><input type='hidden' name='question_id[]' id='qID_36' value='297057' \/><input type='hidden' id='answerType297057' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297057[]' id='answer-id-1165622' class='answer   answerof-297057 ' value='1165622'   \/><label for='answer-id-1165622' id='answer-label-1165622' class=' answer'><span>Turn on VPC Flow Logs for all VPCs in the account.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297057[]' id='answer-id-1165623' class='answer   answerof-297057 ' value='1165623'   \/><label for='answer-id-1165623' id='answer-label-1165623' class=' answer'><span>Activate Amazon GuardDuty across all AWS Regions.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297057[]' id='answer-id-1165624' class='answer   answerof-297057 ' value='1165624'   \/><label for='answer-id-1165624' id='answer-label-1165624' class=' answer'><span>Activate Amazon Detective across all AWS Regions.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297057[]' id='answer-id-1165625' class='answer   answerof-297057 ' value='1165625'   \/><label for='answer-id-1165625' id='answer-label-1165625' class=' answer'><span>Create an Amazon Simple Notification Service (Amazon SNS) topic. Create an Amazon EventBridge rule that responds to findings and publishes the findings to the SNS topic.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297057[]' id='answer-id-1165626' class='answer   answerof-297057 ' value='1165626'   \/><label for='answer-id-1165626' id='answer-label-1165626' class=' answer'><span>Create an AWS Lambda function. Create an Amazon EventBridge rule that invokes the Lambda function to publish findings to Amazon Simple Email Ser-vice (Amazon SES).<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-37' style=';'><div id='questionWrap-37'  class='   watupro-question-id-297058'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>37. <\/span>A team is using AWS Secrets Manager to store an application database password. Only a limited number of IAM principals within the account can have access to the secret. The principals who require access to the secret change frequently. A security engineer must create a solution that maximizes flexibility and scalability. <br \/>\r<br>Which solution will meet these requirements?<\/div><input type='hidden' name='question_id[]' id='qID_37' value='297058' \/><input type='hidden' id='answerType297058' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297058[]' id='answer-id-1165627' class='answer   answerof-297058 ' value='1165627'   \/><label for='answer-id-1165627' id='answer-label-1165627' class=' answer'><span>Use a role-based approach by creating an IAM role with an inline permissions policy that allows access to the secret. Update the IAM principals in the role trust policy as required.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297058[]' id='answer-id-1165628' class='answer   answerof-297058 ' value='1165628'   \/><label for='answer-id-1165628' id='answer-label-1165628' class=' answer'><span>Deploy a VPC endpoint for Secrets Manager. Create and attach an endpoint policy that specifies the IAM principals that are allowed to access the secret. Update the list of IAM principals as required.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297058[]' id='answer-id-1165629' class='answer   answerof-297058 ' value='1165629'   \/><label for='answer-id-1165629' id='answer-label-1165629' class=' answer'><span>Use a tag-based approach by attaching a resource policy to the secret. Apply tags to the secret and the IAM principals. Use the aws:PrincipalTag and aws:ResourceTag IAM condition keys to control access.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297058[]' id='answer-id-1165630' class='answer   answerof-297058 ' value='1165630'   \/><label for='answer-id-1165630' id='answer-label-1165630' class=' answer'><span>Use a deny-by-default approach by using IAM policies to deny access to the secret explicitly. Attach the policies to an IAM group. Add all IAM principals to the IAM group. Remove principals from the group when they need access. Add the principals to the group again when access is no longer allowed.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-38' style=';'><div id='questionWrap-38'  class='   watupro-question-id-297059'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>38. <\/span>A company uses AWS Organizations to run workloads in multiple AWS accounts Currently the individual team members at the company access all Amazon EC2 instances remotely by using SSH or Remote Desktop Protocol (RDP) The company does not have any audit trails and security groups are occasionally open. The company must secure access management and implement a centralized togging solution. <br \/>\r<br>Which solution will meet these requirements MOST securely?<\/div><input type='hidden' name='question_id[]' id='qID_38' value='297059' \/><input type='hidden' id='answerType297059' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297059[]' id='answer-id-1165631' class='answer   answerof-297059 ' value='1165631'   \/><label for='answer-id-1165631' id='answer-label-1165631' class=' answer'><span>Configure trusted access for AWS System Manager in Organizations Configure a bastion host from the management account Replace SSH and RDP by using Systems Manager Session Manager from the management account Configure Session Manager logging to Amazon CloudWatch Logs<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297059[]' id='answer-id-1165632' class='answer   answerof-297059 ' value='1165632'   \/><label for='answer-id-1165632' id='answer-label-1165632' class=' answer'><span>Replace SSH and RDP with AWS Systems Manager Session Manager Install Systems Manager Agent (SSM Agent) on the instances Attach the<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297059[]' id='answer-id-1165633' class='answer   answerof-297059 ' value='1165633'   \/><label for='answer-id-1165633' id='answer-label-1165633' class=' answer'><span>AmazonSSMManagedlnstanceCore role to the instances Configure session data streaming to Amazon CloudWatch Logs Create a separate logging account that has appropriate cross-account permissions to audit the log data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297059[]' id='answer-id-1165634' class='answer   answerof-297059 ' value='1165634'   \/><label for='answer-id-1165634' id='answer-label-1165634' class=' answer'><span>Install a bastion host in the management account Reconfigure all SSH and RDP to allow access only from the bastion host Install AWS Systems Manager Agent (SSM Agent) on the bastion host Attach the AmazonSSMManagedlnstanceCore role to the bastion host Configure session data streaming to Amazon CloudWatch Logs in a separate logging account to audit log data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297059[]' id='answer-id-1165635' class='answer   answerof-297059 ' value='1165635'   \/><label for='answer-id-1165635' id='answer-label-1165635' class=' answer'><span>Replace SSH and RDP with AWS Systems Manager State Manager Install Systems Manager Agent (SSM Agent) on the instances Attach the AmazonSSMManagedlnstanceCore role to the instances Configure session data streaming to Amazon CloudTrail Use CloudTrail Insights to analyze the trail data<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-39' style=';'><div id='questionWrap-39'  class='   watupro-question-id-297060'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>39. <\/span>A company became aware that one of its access keys was exposed on a code sharing website 11 days ago. A Security Engineer must review all use of the exposed access keys to determine the extent of the exposure. The company enabled IAM CloudTrail m an regions when it opened the account <br \/>\r<br>Which of the following will allow (he Security Engineer 10 complete the task?<\/div><input type='hidden' name='question_id[]' id='qID_39' value='297060' \/><input type='hidden' id='answerType297060' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297060[]' id='answer-id-1165636' class='answer   answerof-297060 ' value='1165636'   \/><label for='answer-id-1165636' id='answer-label-1165636' class=' answer'><span>Filter the event history on the exposed access key in the CloudTrail console Examine the data from the past 11 days.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297060[]' id='answer-id-1165637' class='answer   answerof-297060 ' value='1165637'   \/><label for='answer-id-1165637' id='answer-label-1165637' class=' answer'><span>Use the IAM CLI lo generate an IAM credential report Extract all the data from the past 11 days.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297060[]' id='answer-id-1165638' class='answer   answerof-297060 ' value='1165638'   \/><label for='answer-id-1165638' id='answer-label-1165638' class=' answer'><span>Use Amazon Athena to query the CloudTrail logs from Amazon S3 Retrieve the rows for the exposed access key tor the past 11 days.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297060[]' id='answer-id-1165639' class='answer   answerof-297060 ' value='1165639'   \/><label for='answer-id-1165639' id='answer-label-1165639' class=' answer'><span>Use the Access Advisor tab in the IAM console to view all of the access key activity for the past 11 days.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-40' style=';'><div id='questionWrap-40'  class='   watupro-question-id-297061'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>40. <\/span>An application team wants to use IAM Certificate Manager (ACM) to request public certificates to ensure that data is secured in transit. The domains that are being used are not currently hosted on Amazon Route 53 <br \/>\r<br>The application team wants to use an IAM managed distribution and caching solution to optimize requests to its systems and provide better points of presence to customers The distribution solution will use a primary domain name that is customized The distribution solution also will use several alternative domain names The certificates must renew automatically over an indefinite period of time <br \/>\r<br>Which combination of steps should the application team take to deploy this architecture? (Select THREE.)<\/div><input type='hidden' name='question_id[]' id='qID_40' value='297061' \/><input type='hidden' id='answerType297061' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297061[]' id='answer-id-1165640' class='answer   answerof-297061 ' value='1165640'   \/><label for='answer-id-1165640' id='answer-label-1165640' class=' answer'><span>Request a certificate (torn ACM in the us-west-2 Region Add the domain names that the certificate will secure<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297061[]' id='answer-id-1165641' class='answer   answerof-297061 ' value='1165641'   \/><label for='answer-id-1165641' id='answer-label-1165641' class=' answer'><span>Send an email message to the domain administrators to request vacation of the domains for ACM<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297061[]' id='answer-id-1165642' class='answer   answerof-297061 ' value='1165642'   \/><label for='answer-id-1165642' id='answer-label-1165642' class=' answer'><span>Request validation of the domains for ACM through DNS Insert CNAME records into each domain's DNS zone<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297061[]' id='answer-id-1165643' class='answer   answerof-297061 ' value='1165643'   \/><label for='answer-id-1165643' id='answer-label-1165643' class=' answer'><span>Create an Application Load Balancer for me caching solution Select the newly requested certificate from ACM to be used for secure connections<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297061[]' id='answer-id-1165644' class='answer   answerof-297061 ' value='1165644'   \/><label for='answer-id-1165644' id='answer-label-1165644' class=' answer'><span>Create an Amazon CloudFront distribution for the caching solution Enter the main CNAME record as the Origin Name Enter the subdomain names or alternate names in the Alternate Domain Names Distribution Settings Select the newly requested certificate from ACM to be used for secure connections<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297061[]' id='answer-id-1165645' class='answer   answerof-297061 ' value='1165645'   \/><label for='answer-id-1165645' id='answer-label-1165645' class=' answer'><span>Request a certificate from ACM in the us-east-1 Region Add the domain names that the certificate wil secure<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-41' style=';'><div id='questionWrap-41'  class='   watupro-question-id-297062'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>41. <\/span>A company uses Amazon API Gateway to present REST APIs to users. An API developer wants to analyze API access patterns without the need to parse the log files. <br \/>\r<br>Which combination of steps will meet these requirements with the LEAST effort? (Select TWO.)<\/div><input type='hidden' name='question_id[]' id='qID_41' value='297062' \/><input type='hidden' id='answerType297062' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297062[]' id='answer-id-1165646' class='answer   answerof-297062 ' value='1165646'   \/><label for='answer-id-1165646' id='answer-label-1165646' class=' answer'><span>Configure access logging for the required API stage.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297062[]' id='answer-id-1165647' class='answer   answerof-297062 ' value='1165647'   \/><label for='answer-id-1165647' id='answer-label-1165647' class=' answer'><span>Configure an AWS CloudTrail trail destination for API Gateway events. Configure filters on the userldentity, userAgent, and sourcelPAddress fields.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297062[]' id='answer-id-1165648' class='answer   answerof-297062 ' value='1165648'   \/><label for='answer-id-1165648' id='answer-label-1165648' class=' answer'><span>Configure an Amazon S3 destination for API Gateway logs. Run Amazon Athena queries to analyze API access information.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297062[]' id='answer-id-1165649' class='answer   answerof-297062 ' value='1165649'   \/><label for='answer-id-1165649' id='answer-label-1165649' class=' answer'><span>Use Amazon CloudWatch Logs Insights to analyze API access information.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297062[]' id='answer-id-1165650' class='answer   answerof-297062 ' value='1165650'   \/><label for='answer-id-1165650' id='answer-label-1165650' class=' answer'><span>Select the Enable Detailed CloudWatch Metrics option on the required API stage.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-42' style=';'><div id='questionWrap-42'  class='   watupro-question-id-297063'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>42. <\/span>There are currently multiple applications hosted in a VPC. During monitoring it has been noticed that multiple port scans are coming in from a specific IP Address block. The internal security team has requested that all offending IP Addresses be denied for the next 24 hours. <br \/>\r<br>Which of the following is the best method to quickly and temporarily deny access from the specified IP Address's.<\/div><input type='hidden' name='question_id[]' id='qID_42' value='297063' \/><input type='hidden' id='answerType297063' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297063[]' id='answer-id-1165651' class='answer   answerof-297063 ' value='1165651'   \/><label for='answer-id-1165651' id='answer-label-1165651' class=' answer'><span>Create an AD policy to modify the Windows Firewall settings on all hosts in the VPC to deny access from the IP Address block.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297063[]' id='answer-id-1165652' class='answer   answerof-297063 ' value='1165652'   \/><label for='answer-id-1165652' id='answer-label-1165652' class=' answer'><span>Modify the Network ACLs associated with all public subnets in the VPC to deny access from the IP Address block.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297063[]' id='answer-id-1165653' class='answer   answerof-297063 ' value='1165653'   \/><label for='answer-id-1165653' id='answer-label-1165653' class=' answer'><span>Add a rule to all of the VPC Security Groups to deny access from the IP Address block.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297063[]' id='answer-id-1165654' class='answer   answerof-297063 ' value='1165654'   \/><label for='answer-id-1165654' id='answer-label-1165654' class=' answer'><span>Modify the Windows Firewall settings on all AMI'S that your organization uses in that VPC to deny access from the IP address block.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-43' style=';'><div id='questionWrap-43'  class='   watupro-question-id-297064'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>43. <\/span>A company needs to store multiple years of financial records. The company wants to use Amazon S3 to store copies of these documents. The company must implement a solution to prevent the documents from being edited, replaced, or deleted for 7 years after the documents are stored in Amazon S3. The solution must also encrypt the documents at rest. <br \/>\r<br>A security engineer creates a new S3 bucket to store the documents. <br \/>\r<br>What should the security engineer do next to meet these requirements?<\/div><input type='hidden' name='question_id[]' id='qID_43' value='297064' \/><input type='hidden' id='answerType297064' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297064[]' id='answer-id-1165655' class='answer   answerof-297064 ' value='1165655'   \/><label for='answer-id-1165655' id='answer-label-1165655' class=' answer'><span>Configure S3 server-side encryption. Create an S3 bucket policy that has an explicit deny rule for all users for s3:DeleteObject and s3:PutObject API calls. Configure S3 Object Lock to use governance mode with a retention period of 7 years.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297064[]' id='answer-id-1165656' class='answer   answerof-297064 ' value='1165656'   \/><label for='answer-id-1165656' id='answer-label-1165656' class=' answer'><span>Configure S3 server-side encryption. Configure S3 Versioning on the S3 bucket. Configure S3 Object Lock to use compliance mode with a retention period of 7 years.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297064[]' id='answer-id-1165657' class='answer   answerof-297064 ' value='1165657'   \/><label for='answer-id-1165657' id='answer-label-1165657' class=' answer'><span>Configure S3 Versioning. Configure S3 Intelligent-Tiering on the S3 bucket to move the documents to S3 Glacier Deep Archive storage. Use S3 server-side encryption immediately. Expire the objects after 7 years.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297064[]' id='answer-id-1165658' class='answer   answerof-297064 ' value='1165658'   \/><label for='answer-id-1165658' id='answer-label-1165658' class=' answer'><span>Set up S3 Event Notifications and use S3 server-side encryption. Configure S3 Event Notifications to target an AWS Lambda function that will review any S3 API call to the S3 bucket and deny the s3:DeleteObject and s3:PutObject API calls. Remove the S3 event notification after 7 years.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-44' style=';'><div id='questionWrap-44'  class='   watupro-question-id-297065'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>44. <\/span>There is a requirement for a company to transfer large amounts of data between IAM and an on-premise location. There is an additional requirement for low latency and high consistency traffic to IAM. <br \/>\r<br>Given these requirements how would you design a hybrid architecture? Choose the correct answer from the options below<\/div><input type='hidden' name='question_id[]' id='qID_44' value='297065' \/><input type='hidden' id='answerType297065' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297065[]' id='answer-id-1165659' class='answer   answerof-297065 ' value='1165659'   \/><label for='answer-id-1165659' id='answer-label-1165659' class=' answer'><span>Provision a Direct Connect connection to an IAM region using a Direct Connect partner.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297065[]' id='answer-id-1165660' class='answer   answerof-297065 ' value='1165660'   \/><label for='answer-id-1165660' id='answer-label-1165660' class=' answer'><span>Create a VPN tunnel for private connectivity, which increases network consistency and reduces latency.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297065[]' id='answer-id-1165661' class='answer   answerof-297065 ' value='1165661'   \/><label for='answer-id-1165661' id='answer-label-1165661' class=' answer'><span>Create an IPsec tunnel for private connectivity, which increases network consistency and reduces latency.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297065[]' id='answer-id-1165662' class='answer   answerof-297065 ' value='1165662'   \/><label for='answer-id-1165662' id='answer-label-1165662' class=' answer'><span>Create a VPC peering connection between IAM and the Customer gateway.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-45' style=';'><div id='questionWrap-45'  class='   watupro-question-id-297066'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>45. <\/span>A company uses a third-party identity provider and SAML-based SSO for its AWS accounts. After the third-party identity provider renewed an expired signing certificate, users saw the following message when trying to log in: <br \/>\r<br>Error: Response Signature Invalid (Service: AWSSecurityTokenService; Status Code: 400; Error Code: <br \/>\r<br>InvalidldentityToken) <br \/>\r<br>A security engineer needs to provide a solution that corrects the error and minimizes operational overhead. <br \/>\r<br>Which solution meets these requirements?<\/div><input type='hidden' name='question_id[]' id='qID_45' value='297066' \/><input type='hidden' id='answerType297066' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297066[]' id='answer-id-1165663' class='answer   answerof-297066 ' value='1165663'   \/><label for='answer-id-1165663' id='answer-label-1165663' class=' answer'><span>Upload the third-party signing certificate's new private key to the AWS identity provider entity defined in AWS Identity and Access Management (IAM) by using the AWS Management Console.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297066[]' id='answer-id-1165664' class='answer   answerof-297066 ' value='1165664'   \/><label for='answer-id-1165664' id='answer-label-1165664' class=' answer'><span>Sign the identity provider's metadata file with the new public key. Upload the signature to the AWS identity provider entity defined in AWS Identity and Access Management (IAM) by using the AWS C<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297066[]' id='answer-id-1165665' class='answer   answerof-297066 ' value='1165665'   \/><label for='answer-id-1165665' id='answer-label-1165665' class=' answer'><span>Download the updated SAML metadata file from the identity service provider. Update the file in the AWS identity provider entity defined in AWS Identity and Access Management (IAM) by using the AWS CL<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297066[]' id='answer-id-1165666' class='answer   answerof-297066 ' value='1165666'   \/><label for='answer-id-1165666' id='answer-label-1165666' class=' answer'><span>Configure the AWS identity provider entity defined in AWS Identity and Access Management (IAM) to synchronously fetch the new public key by using the AWS Management Console.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-46' style=';'><div id='questionWrap-46'  class='   watupro-question-id-297067'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>46. <\/span>An AWS account that is used for development projects has a VPC that contains two subnets. The first subnet is named public-subnet-1 and has the CIDR block 192.168.1.0\/24 assigned. The other subnet is named private-subnet-2 and has the CIDR block 192.168.2.0\/24 assigned. Each subnet contains Amazon EC2 instances. <br \/>\r<br>Each subnet is currently using the VPC's default network ACL. The security groups that the EC2 instances in these subnets use have rules that allow traffic between each instance where required. Currently, all network traffic flow is working as expected between the EC2 instances that are using these subnets. <br \/>\r<br>A security engineer creates a new network ACL that is named subnet-2-NACL with default entries. The security engineer immediately configures private-subnet-2 to use the new network ACL and makes no other changes to the infrastructure. The security engineer starts to receive reports that the EC2 instances in public-subnet-1 and public-subnet-2 cannot communicate with each other. <br \/>\r<br>Which combination of steps should the security engineer take to allow the EC2 instances that are running in these two subnets to communicate again? (Select TWO.)<\/div><input type='hidden' name='question_id[]' id='qID_46' value='297067' \/><input type='hidden' id='answerType297067' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297067[]' id='answer-id-1165667' class='answer   answerof-297067 ' value='1165667'   \/><label for='answer-id-1165667' id='answer-label-1165667' class=' answer'><span>Add an outbound allow rule for 192.168.2.0\/24 in the VPC's default network AC<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297067[]' id='answer-id-1165668' class='answer   answerof-297067 ' value='1165668'   \/><label for='answer-id-1165668' id='answer-label-1165668' class=' answer'><span>Add an inbound allow rule for 192.168.2.0\/24 in the VPC's default network AC<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297067[]' id='answer-id-1165669' class='answer   answerof-297067 ' value='1165669'   \/><label for='answer-id-1165669' id='answer-label-1165669' class=' answer'><span>Add an outbound allow rule for 192.168.2.0\/24 in subnet-2-NAC<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297067[]' id='answer-id-1165670' class='answer   answerof-297067 ' value='1165670'   \/><label for='answer-id-1165670' id='answer-label-1165670' class=' answer'><span>Add an inbound allow rule for 192.168.1.0\/24 in subnet-2-NAC<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297067[]' id='answer-id-1165671' class='answer   answerof-297067 ' value='1165671'   \/><label for='answer-id-1165671' id='answer-label-1165671' class=' answer'><span>Add an outbound allow rule for 192.168.1.0\/24 in subnet-2-NAC<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-47' style=';'><div id='questionWrap-47'  class='   watupro-question-id-297068'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>47. <\/span>Within a VPC, a corporation runs an Amazon RDS Multi-AZ DB instance. The database instance is connected to the internet through a NAT gateway via two subnets. <br \/>\r<br>Additionally, the organization has application servers that are hosted on Amazon EC2 instances and use the RDS database. These EC2 instances have been deployed onto two more private subnets inside the same VPC. These EC2 instances connect to the internet through a default route via the same NAT gateway. Each VPC subnet has its own route table. <br \/>\r<br>The organization implemented a new security requirement after a recent security examination. Never allow the database instance to connect to the internet. A security engineer must perform this update promptly without interfering with the network traffic of the application servers. <br \/>\r<br>How will the security engineer be able to comply with these requirements?<\/div><input type='hidden' name='question_id[]' id='qID_47' value='297068' \/><input type='hidden' id='answerType297068' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297068[]' id='answer-id-1165672' class='answer   answerof-297068 ' value='1165672'   \/><label for='answer-id-1165672' id='answer-label-1165672' class=' answer'><span>Remove the existing NAT gateway. Create a new NAT gateway that only the application server subnets can use.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297068[]' id='answer-id-1165673' class='answer   answerof-297068 ' value='1165673'   \/><label for='answer-id-1165673' id='answer-label-1165673' class=' answer'><span>Configure the DB instance&#8482;s inbound network ACL to deny traffic from the security group ID of the NAT gateway.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297068[]' id='answer-id-1165674' class='answer   answerof-297068 ' value='1165674'   \/><label for='answer-id-1165674' id='answer-label-1165674' class=' answer'><span>Modify the route tables of the DB instance subnets to remove the default route to the NAT gateway.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297068[]' id='answer-id-1165675' class='answer   answerof-297068 ' value='1165675'   \/><label for='answer-id-1165675' id='answer-label-1165675' class=' answer'><span>Configure the route table of the NAT gateway to deny connections to the DB instance subnets.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-48' style=';'><div id='questionWrap-48'  class='   watupro-question-id-297069'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>48. <\/span>An audit determined that a company's Amazon EC2 instance security group violated company policy by allowing unrestricted incoming SSH traffic. A security engineer must implement a near-real-time monitoring and alerting solution that will notify administrators of such violations. <br \/>\r<br>Which solution meets these requirements with the MOST operational efficiency?<\/div><input type='hidden' name='question_id[]' id='qID_48' value='297069' \/><input type='hidden' id='answerType297069' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297069[]' id='answer-id-1165676' class='answer   answerof-297069 ' value='1165676'   \/><label for='answer-id-1165676' id='answer-label-1165676' class=' answer'><span>Create a recurring Amazon Inspector assessment run that runs every day and uses the Network Reachability package. Create an Amazon CloudWatch rule that invokes an IAM Lambda function when an assessment run starts. Configure the Lambda function to retrieve and evaluate the assessment run report when it completes. Configure the Lambda function also to publish an Amazon Simple Notification Service (Amazon SNS) notification if there are any violations for unrestricted incoming SSH traffic.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297069[]' id='answer-id-1165677' class='answer   answerof-297069 ' value='1165677'   \/><label for='answer-id-1165677' id='answer-label-1165677' class=' answer'><span>Use the restricted-ssh IAM Config managed rule that is invoked by security group configuration changes that are not compliant. Use the IAM Config remediation feature to publish a message to an Amazon Simple Notification Service (Amazon SNS) topic.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297069[]' id='answer-id-1165678' class='answer   answerof-297069 ' value='1165678'   \/><label for='answer-id-1165678' id='answer-label-1165678' class=' answer'><span>Configure VPC Flow Logs for the VP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297069[]' id='answer-id-1165679' class='answer   answerof-297069 ' value='1165679'   \/><label for='answer-id-1165679' id='answer-label-1165679' class=' answer'><span>and specify an Amazon CloudWatch Logs group. Subscribe the CloudWatch Logs group to an IAM Lambda function that parses new log entries, detects successful connections on port 22, and publishes a notification through Amazon Simple Notification Service (Amazon SNS).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297069[]' id='answer-id-1165680' class='answer   answerof-297069 ' value='1165680'   \/><label for='answer-id-1165680' id='answer-label-1165680' class=' answer'><span>Create a recurring Amazon Inspector assessment run that runs every day and uses the Security Best Practices package. Create an Amazon CloudWatch rule that invokes an IAM Lambda function when an assessment run starts. Configure the Lambda function to retrieve and evaluate the assessment run report when it completes. Configure the Lambda function also to publish an Amazon Simple Notification Service (Amazon SNS) notification if there are any violations for unrestricted incoming SSH traffic.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-49' style=';'><div id='questionWrap-49'  class='   watupro-question-id-297070'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>49. <\/span>A company is using Amazon Elastic Container Service (Amazon ECS) to deploy an application that deals with sensitive data During a recent security audit, the company identified a security issue in which Amazon RDS credentials were stored with the application code In the company's source code repository <br \/>\r<br>A security engineer needs to develop a solution to ensure that database credentials are stored securely and rotated periodically. The credentials should be accessible to the application only The engineer also needs to prevent database administrators from sharing database credentials as plaintext with other teammates. The solution must also minimize administrate overhead <br \/>\r<br>Which solution meets these requirements?<\/div><input type='hidden' name='question_id[]' id='qID_49' value='297070' \/><input type='hidden' id='answerType297070' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297070[]' id='answer-id-1165681' class='answer   answerof-297070 ' value='1165681'   \/><label for='answer-id-1165681' id='answer-label-1165681' class=' answer'><span>Use the IAM Systems Manager Parameter Store to generate database credentials. Use an IAM profile for ECS tasks to restrict access to database credentials to specific containers only.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297070[]' id='answer-id-1165682' class='answer   answerof-297070 ' value='1165682'   \/><label for='answer-id-1165682' id='answer-label-1165682' class=' answer'><span>Use IAM Secrets Manager to store database credentials. Use an IAM inline policy for ECS tasks to restrict access to database credentials to specific containers only.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297070[]' id='answer-id-1165683' class='answer   answerof-297070 ' value='1165683'   \/><label for='answer-id-1165683' id='answer-label-1165683' class=' answer'><span>Use the IAM Systems Manager Parameter Store to store database credentials. Use IAM roles for ECS tasks to restrict access to database credentials lo specific containers only<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297070[]' id='answer-id-1165684' class='answer   answerof-297070 ' value='1165684'   \/><label for='answer-id-1165684' id='answer-label-1165684' class=' answer'><span>Use IAM Secrets Manager to store database credentials. Use IAM roles for ECS tasks to restrict access to database credentials to specific containers only.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-50' style=';'><div id='questionWrap-50'  class='   watupro-question-id-297071'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>50. <\/span>A company discovers a billing anomaly in its AWS account. A security consultant investigates the anomaly and discovers that an employee who left the company 30 days ago still has access to the account. <br \/>\r<br>The company has not monitored account activity in the past. <br \/>\r<br>The security consultant needs to determine which resources have been deployed or reconfigured by the employee as quickly as possible. <br \/>\r<br>Which solution will meet these requirements?<\/div><input type='hidden' name='question_id[]' id='qID_50' value='297071' \/><input type='hidden' id='answerType297071' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297071[]' id='answer-id-1165685' class='answer   answerof-297071 ' value='1165685'   \/><label for='answer-id-1165685' id='answer-label-1165685' class=' answer'><span>In AWS Cost Explorer, filter chart data to display results from the past 30 days. Export the results to a data table. Group the data table by re-source.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297071[]' id='answer-id-1165686' class='answer   answerof-297071 ' value='1165686'   \/><label for='answer-id-1165686' id='answer-label-1165686' class=' answer'><span>Use AWS Cost Anomaly Detection to create a cost monitor. Access the detection history. Set the time frame to Last 30 days. In the search area, choose the service category.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297071[]' id='answer-id-1165687' class='answer   answerof-297071 ' value='1165687'   \/><label for='answer-id-1165687' id='answer-label-1165687' class=' answer'><span>In AWS CloudTrail, filter the event history to display results from the past 30 days. Create an Amazon Athena table that contains the data. Partition the table by event source.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297071[]' id='answer-id-1165688' class='answer   answerof-297071 ' value='1165688'   \/><label for='answer-id-1165688' id='answer-label-1165688' class=' answer'><span>Use AWS Audit Manager to create an assessment for the past 30 days. Apply a usage-based framework to the assessment. Configure the assessment to assess by resource.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-51' style=';'><div id='questionWrap-51'  class='   watupro-question-id-297072'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>51. <\/span>A company wants to monitor the deletion of AWS Key Management Service (AWS KMS) customer managed keys. A security engineer needs to create an alarm that will notify the company before a KMS key is deleted. The security engineer has configured the integration of AWS CloudTrail with Amazon CloudWatch. <br \/>\r<br>What should the security engineer do next to meet these requirements?<\/div><input type='hidden' name='question_id[]' id='qID_51' value='297072' \/><input type='hidden' id='answerType297072' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297072[]' id='answer-id-1165689' class='answer   answerof-297072 ' value='1165689'   \/><label for='answer-id-1165689' id='answer-label-1165689' class=' answer'><span>Specify the deletion time of the key material during KMS key creation. Create a custom AWS Config rule to assess the key's scheduled deletion. Configure the rule to trigger upon a configuration change. Send a message to an Amazon Simple Notification Service (Amazon SNS) topic if the key is scheduled for deletion.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297072[]' id='answer-id-1165690' class='answer   answerof-297072 ' value='1165690'   \/><label for='answer-id-1165690' id='answer-label-1165690' class=' answer'><span>Create an Amazon EventBridge rule to detect KMS API calls of DeleteAlias. Create an AWS Lambda function to send an Amazon Simple Notification Service (Amazon SNS) message to the company. Add the Lambda function as the target of the EventBridge rule.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297072[]' id='answer-id-1165691' class='answer   answerof-297072 ' value='1165691'   \/><label for='answer-id-1165691' id='answer-label-1165691' class=' answer'><span>Create an Amazon EventBridge rule to detect KMS API calls of DisableKey and ScheduleKeyDeletion. Create an AWS Lambda function to send an Amazon Simple Notification Service (Amazon SNS) message to the company. Add the Lambda function as the target of the EventBridge rule.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297072[]' id='answer-id-1165692' class='answer   answerof-297072 ' value='1165692'   \/><label for='answer-id-1165692' id='answer-label-1165692' class=' answer'><span>Create an Amazon Simple Notification Service (Amazon SNS) policy to detect KMS API calls of RevokeGrant and ScheduleKeyDeletion. Create an AWS Lambda function to generate the alarm and send the notification to the company. Add the Lambda function as the target of the SNS policy.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-52' style=';'><div id='questionWrap-52'  class='   watupro-question-id-297073'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>52. <\/span>A company accidentally deleted the private key for an Amazon Elastic Block Store (Amazon EBS)-backed Amazon EC2 instance. A security engineer needs to regain access to the instance. <br \/>\r<br>Which combination of steps will meet this requirement? (Choose two.)<\/div><input type='hidden' name='question_id[]' id='qID_52' value='297073' \/><input type='hidden' id='answerType297073' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297073[]' id='answer-id-1165693' class='answer   answerof-297073 ' value='1165693'   \/><label for='answer-id-1165693' id='answer-label-1165693' class=' answer'><span>Stop the instance. Detach the root volume. Generate a new key pair.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297073[]' id='answer-id-1165694' class='answer   answerof-297073 ' value='1165694'   \/><label for='answer-id-1165694' id='answer-label-1165694' class=' answer'><span>Keep the instance running. Detach the root volume. Generate a new key pair.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297073[]' id='answer-id-1165695' class='answer   answerof-297073 ' value='1165695'   \/><label for='answer-id-1165695' id='answer-label-1165695' class=' answer'><span>When the volume is detached from the original instance, attach the volume to another instance as a data volume. Modify the authorized_keys file with a new public key. Move the volume back to the original instance. Start the instance.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297073[]' id='answer-id-1165696' class='answer   answerof-297073 ' value='1165696'   \/><label for='answer-id-1165696' id='answer-label-1165696' class=' answer'><span>When the volume is detached from the original instance, attach the volume to another instance as a data volume. Modify the authorized_keys file with a new private key. Move the volume back to the original instance. Start the instance.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297073[]' id='answer-id-1165697' class='answer   answerof-297073 ' value='1165697'   \/><label for='answer-id-1165697' id='answer-label-1165697' class=' answer'><span>When the volume is detached from the original instance, attach the volume to another instance as a data volume. Modify the authorized_keys file with a new public key. Move the volume back to the original instance that is running.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-53' style=';'><div id='questionWrap-53'  class='   watupro-question-id-297074'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>53. <\/span>A company deployed Amazon GuardDuty In the us-east-1 Region. The company wants all DNS logs that relate to the company's Amazon EC2 instances to be inspected. <br \/>\r<br>What should a security engineer do to ensure that the EC2 instances are logged?<\/div><input type='hidden' name='question_id[]' id='qID_53' value='297074' \/><input type='hidden' id='answerType297074' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297074[]' id='answer-id-1165698' class='answer   answerof-297074 ' value='1165698'   \/><label for='answer-id-1165698' id='answer-label-1165698' class=' answer'><span>Use IPv6 addresses that are configured for hostnames.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297074[]' id='answer-id-1165699' class='answer   answerof-297074 ' value='1165699'   \/><label for='answer-id-1165699' id='answer-label-1165699' class=' answer'><span>Configure external DNS resolvers as internal resolvers that are visible only to IA<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297074[]' id='answer-id-1165700' class='answer   answerof-297074 ' value='1165700'   \/><label for='answer-id-1165700' id='answer-label-1165700' class=' answer'><span>Use IAM DNS resolvers for all EC2 instances.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297074[]' id='answer-id-1165701' class='answer   answerof-297074 ' value='1165701'   \/><label for='answer-id-1165701' id='answer-label-1165701' class=' answer'><span>Configure a third-party DNS resolver with logging for all EC2 instances.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-54' style=';'><div id='questionWrap-54'  class='   watupro-question-id-297075'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>54. <\/span>An ecommerce website was down for 1 hour following a DDoS attack Users were unable to connect to the website during the attack period. The ecommerce company's security team is worried about future potential attacks and wants to prepare for such events The company needs to minimize downtime in its response to similar attacks in the future. <br \/>\r<br>Which steps would help achieve this9 (Select TWO)<\/div><input type='hidden' name='question_id[]' id='qID_54' value='297075' \/><input type='hidden' id='answerType297075' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297075[]' id='answer-id-1165702' class='answer   answerof-297075 ' value='1165702'   \/><label for='answer-id-1165702' id='answer-label-1165702' class=' answer'><span>Enable Amazon GuardDuty to automatically monitor for malicious activity and block unauthorized access.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297075[]' id='answer-id-1165703' class='answer   answerof-297075 ' value='1165703'   \/><label for='answer-id-1165703' id='answer-label-1165703' class=' answer'><span>Subscribe to IAM Shield Advanced and reach out to IAM Support in the event of an attack.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297075[]' id='answer-id-1165704' class='answer   answerof-297075 ' value='1165704'   \/><label for='answer-id-1165704' id='answer-label-1165704' class=' answer'><span>Use VPC Flow Logs to monitor network: traffic and an IAM Lambda function to automatically block an attacker's IP using security groups.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297075[]' id='answer-id-1165705' class='answer   answerof-297075 ' value='1165705'   \/><label for='answer-id-1165705' id='answer-label-1165705' class=' answer'><span>Set up an Amazon CloudWatch Events rule to monitor the IAM CloudTrail events in real time use IAM Config rules to audit the configuration, and use IAM Systems Manager for remediation.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297075[]' id='answer-id-1165706' class='answer   answerof-297075 ' value='1165706'   \/><label for='answer-id-1165706' id='answer-label-1165706' class=' answer'><span>Use IAM WAF to create rules to respond to such attacks<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-55' style=';'><div id='questionWrap-55'  class='   watupro-question-id-297076'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>55. <\/span>A security engineer receives an IAM abuse email message. According to the message, an Amazon EC2 instance that is running in the security engineer's IAM account is sending phishing email messages. <br \/>\r<br>The EC2 instance is part of an application that is deployed in production. The application runs on many EC2 instances behind an Application Load Balancer. The instances run in an Amazon EC2 Auto Scaling group across multiple subnets and multiple Availability Zones. <br \/>\r<br>The instances normally communicate only over the HTTP. HTTPS, and MySQL protocols. Upon investigation, the security engineer discovers that email messages are being sent over port 587. All other traffic is normal. <br \/>\r<br>The security engineer must create a solution that contains the compromised EC2 instance, preserves forensic evidence for analysis, and minimizes application downtime. <br \/>\r<br>Which combination of steps must the security engineer take to meet these requirements? (Select THREE.)<\/div><input type='hidden' name='question_id[]' id='qID_55' value='297076' \/><input type='hidden' id='answerType297076' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297076[]' id='answer-id-1165707' class='answer   answerof-297076 ' value='1165707'   \/><label for='answer-id-1165707' id='answer-label-1165707' class=' answer'><span>Add an outbound rule to the security group that is attached to the compromised EC2 instance to deny traffic to 0.0.0.0\/0 and port 587.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297076[]' id='answer-id-1165708' class='answer   answerof-297076 ' value='1165708'   \/><label for='answer-id-1165708' id='answer-label-1165708' class=' answer'><span>Add an outbound rule to the network ACL for the subnet that contains the compromised EC2 instance to deny traffic to 0.0.0.0\/0 and port 587.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297076[]' id='answer-id-1165709' class='answer   answerof-297076 ' value='1165709'   \/><label for='answer-id-1165709' id='answer-label-1165709' class=' answer'><span>Gather volatile memory from the compromised EC2 instance. Suspend the compromised EC2 instance from the Auto Scaling group. Then take a snapshot of the compromised EC2 instance.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297076[]' id='answer-id-1165710' class='answer   answerof-297076 ' value='1165710'   \/><label for='answer-id-1165710' id='answer-label-1165710' class=' answer'><span>Take a snapshot of the compromised EC2 instance. Suspend the compromised EC2 instance from the Auto Scaling group. Then gather volatile memory from the compromised EC2 instance.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297076[]' id='answer-id-1165711' class='answer   answerof-297076 ' value='1165711'   \/><label for='answer-id-1165711' id='answer-label-1165711' class=' answer'><span>Move the compromised EC2 instance to an isolated subnet that has a network ACL that has no inbound rules or outbound rules.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297076[]' id='answer-id-1165712' class='answer   answerof-297076 ' value='1165712'   \/><label for='answer-id-1165712' id='answer-label-1165712' class=' answer'><span>Replace the existing security group that is attached to the compromised EC2 instance with a new security group that has no inbound rules or outbound rules.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-56' style=';'><div id='questionWrap-56'  class='   watupro-question-id-297077'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>56. <\/span>You need to create a policy and apply it for just an individual user. <br \/>\r<br>How could you accomplish this in the right way?<\/div><input type='hidden' name='question_id[]' id='qID_56' value='297077' \/><input type='hidden' id='answerType297077' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297077[]' id='answer-id-1165713' class='answer   answerof-297077 ' value='1165713'   \/><label for='answer-id-1165713' id='answer-label-1165713' class=' answer'><span>Add an IAM managed policy for the user<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297077[]' id='answer-id-1165714' class='answer   answerof-297077 ' value='1165714'   \/><label for='answer-id-1165714' id='answer-label-1165714' class=' answer'><span>Add a service policy for the user<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297077[]' id='answer-id-1165715' class='answer   answerof-297077 ' value='1165715'   \/><label for='answer-id-1165715' id='answer-label-1165715' class=' answer'><span>Add an IAM role for the user<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297077[]' id='answer-id-1165716' class='answer   answerof-297077 ' value='1165716'   \/><label for='answer-id-1165716' id='answer-label-1165716' class=' answer'><span>Add an inline policy for the user<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-57' style=';'><div id='questionWrap-57'  class='   watupro-question-id-297078'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>57. <\/span>Company A has an AWS account that is named Account A. Company A recently acquired Company B, which has an AWS account that is named Account B. Company B stores its files in an Amazon S3 bucket. <br \/>\r<br>The administrators need to give a user from Account A full access to the S3 bucket in Account B. <br \/>\r<br>After the administrators adjust the IAM permissions for the user in Account A to access the S3 bucket in Account B, the user still cannot access any files in the S3 bucket. <br \/>\r<br>Which solution will resolve this issue?<\/div><input type='hidden' name='question_id[]' id='qID_57' value='297078' \/><input type='hidden' id='answerType297078' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297078[]' id='answer-id-1165717' class='answer   answerof-297078 ' value='1165717'   \/><label for='answer-id-1165717' id='answer-label-1165717' class=' answer'><span>In Account B, create a bucket ACL to allow the user from Account A to access the S3 bucket in Account<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297078[]' id='answer-id-1165718' class='answer   answerof-297078 ' value='1165718'   \/><label for='answer-id-1165718' id='answer-label-1165718' class=' answer'><span>In Account B, create an object ACL to allow the user from Account A to access all the objects in the S3 bucket in Account<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297078[]' id='answer-id-1165719' class='answer   answerof-297078 ' value='1165719'   \/><label for='answer-id-1165719' id='answer-label-1165719' class=' answer'><span>In Account B, create a bucket policy to allow the user from Account A to access the S3 bucket in Account<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297078[]' id='answer-id-1165720' class='answer   answerof-297078 ' value='1165720'   \/><label for='answer-id-1165720' id='answer-label-1165720' class=' answer'><span>In Account B, create a user policy to allow the user from Account A to access the S3 bucket in Account<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-58' style=';'><div id='questionWrap-58'  class='   watupro-question-id-297079'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>58. <\/span>A company has a web-based application using Amazon CloudFront and running on Amazon Elastic Container Service (Amazon ECS) behind an Application Load Balancer (ALB). The ALB is terminating TLS and balancing load across ECS service tasks A security engineer needs to design a solution to ensure that application content is accessible only through CloudFront and that I is never accessible directly. <br \/>\r<br>How should the security engineer build the MOST secure solution?<\/div><input type='hidden' name='question_id[]' id='qID_58' value='297079' \/><input type='hidden' id='answerType297079' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297079[]' id='answer-id-1165721' class='answer   answerof-297079 ' value='1165721'   \/><label for='answer-id-1165721' id='answer-label-1165721' class=' answer'><span>Add an origin custom header Set the viewer protocol policy to HTTP and HTTPS Set the origin protocol pokey to HTTPS only Update the application to validate the CloudFront custom header<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297079[]' id='answer-id-1165722' class='answer   answerof-297079 ' value='1165722'   \/><label for='answer-id-1165722' id='answer-label-1165722' class=' answer'><span>Add an origin custom header Set the viewer protocol policy to HTTPS only Set the origin protocol policy to match viewer Update the application to validate the CloudFront custom header.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297079[]' id='answer-id-1165723' class='answer   answerof-297079 ' value='1165723'   \/><label for='answer-id-1165723' id='answer-label-1165723' class=' answer'><span>Add an origin custom header Set the viewer protocol policy to redirect HTTP to HTTPS Set the origin protocol policy to HTTP only Update the application to validate the CloudFront custom header.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297079[]' id='answer-id-1165724' class='answer   answerof-297079 ' value='1165724'   \/><label for='answer-id-1165724' id='answer-label-1165724' class=' answer'><span>Add an origin custom header Set the viewer protocol policy to redirect HTTP to HTTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297079[]' id='answer-id-1165725' class='answer   answerof-297079 ' value='1165725'   \/><label for='answer-id-1165725' id='answer-label-1165725' class=' answer'><span>Set the origin protocol policy to HTTPS only Update the application to validate the CloudFront custom header<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-59' style=';'><div id='questionWrap-59'  class='   watupro-question-id-297080'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>59. <\/span>A company is using IAM Secrets Manager to store secrets for its production Amazon RDS database. The Security Officer has asked that secrets be rotated every 3 months. <br \/>\r<br>Which solution would allow the company to securely rotate the secrets? (Select TWO.)<\/div><input type='hidden' name='question_id[]' id='qID_59' value='297080' \/><input type='hidden' id='answerType297080' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297080[]' id='answer-id-1165726' class='answer   answerof-297080 ' value='1165726'   \/><label for='answer-id-1165726' id='answer-label-1165726' class=' answer'><span>Place the RDS instance in a public subnet and an IAM Lambda function outside the VP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297080[]' id='answer-id-1165727' class='answer   answerof-297080 ' value='1165727'   \/><label for='answer-id-1165727' id='answer-label-1165727' class=' answer'><span>Schedule the Lambda function to run every 3 months to rotate the secrets.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297080[]' id='answer-id-1165728' class='answer   answerof-297080 ' value='1165728'   \/><label for='answer-id-1165728' id='answer-label-1165728' class=' answer'><span>Place the RDS instance in a private subnet and an IAM Lambda function inside the VPC in the private subnet. Configure the private subnet to use a NAT gateway. Schedule the Lambda function to run every 3 months to rotate the secrets.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297080[]' id='answer-id-1165729' class='answer   answerof-297080 ' value='1165729'   \/><label for='answer-id-1165729' id='answer-label-1165729' class=' answer'><span>Place the RDS instance in a private subnet and an IAM Lambda function outside the VP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297080[]' id='answer-id-1165730' class='answer   answerof-297080 ' value='1165730'   \/><label for='answer-id-1165730' id='answer-label-1165730' class=' answer'><span>Configure the private subnet to use an internet gateway. Schedule the Lambda function to run every 3 months lo rotate the secrets.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297080[]' id='answer-id-1165731' class='answer   answerof-297080 ' value='1165731'   \/><label for='answer-id-1165731' id='answer-label-1165731' class=' answer'><span>Place the RDS instance in a private subnet and an IAM Lambda function inside the VPC in the private subnet. Schedule the Lambda function to run quarterly to rotate the secrets.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297080[]' id='answer-id-1165732' class='answer   answerof-297080 ' value='1165732'   \/><label for='answer-id-1165732' id='answer-label-1165732' class=' answer'><span>Place the RDS instance in a private subnet and an IAM Lambda function inside the VPC in the private subnet. Configure a Secrets Manager interface endpoint. Schedule the Lambda function to run every 3 months to rotate the secrets.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-60' style=';'><div id='questionWrap-60'  class='   watupro-question-id-297081'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>60. <\/span>You work at a company that makes use of IAM resources. One of the key security policies is to ensure that all data i encrypted both at rest and in transit. <br \/>\r<br>Which of the following is one of the right ways to implement this.<\/div><input type='hidden' name='question_id[]' id='qID_60' value='297081' \/><input type='hidden' id='answerType297081' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297081[]' id='answer-id-1165733' class='answer   answerof-297081 ' value='1165733'   \/><label for='answer-id-1165733' id='answer-label-1165733' class=' answer'><span>Use S3 SSE and use SSL for data in transit<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297081[]' id='answer-id-1165734' class='answer   answerof-297081 ' value='1165734'   \/><label for='answer-id-1165734' id='answer-label-1165734' class=' answer'><span>SSL termination on the ELB<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297081[]' id='answer-id-1165735' class='answer   answerof-297081 ' value='1165735'   \/><label for='answer-id-1165735' id='answer-label-1165735' class=' answer'><span>Enabling Proxy Protocol<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297081[]' id='answer-id-1165736' class='answer   answerof-297081 ' value='1165736'   \/><label for='answer-id-1165736' id='answer-label-1165736' class=' answer'><span>Enabling sticky sessions on your load balancer<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-61' style=';'><div id='questionWrap-61'  class='   watupro-question-id-297082'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>61. <\/span>A security engineer configures Amazon S3 Cross-Region Replication (CRR) for all objects that are in an S3 bucket in the us-east-1. Region Some objects in this S3 bucket use server-side encryption with AWS KMS keys (SSE-KMS) for encryption at test. The security engineer creates a destination S3 bucket in the us-west-2 Region. The destination S3 bucket is in the same AWS account as the source S3 bucket. <br \/>\r<br>The security engineer also creates a customer managed key in us-west-2 to encrypt objects at rest in the destination S3 bucket. The replication configuration is set to use the key in us-west-2 to encrypt objects in the destination S3 bucket. The security engineer has provided the S3 replication configuration with an IAM role to perform the replication in Amazon S3. <br \/>\r<br>After a day, the security engineer notices that no encrypted objects from the source S3 bucket are replicated to the destination S3 bucket. However, all the unencrypted objects are replicated. <br \/>\r<br>Which combination of steps should the security engineer take to remediate this issue? (Select THREE.)<\/div><input type='hidden' name='question_id[]' id='qID_61' value='297082' \/><input type='hidden' id='answerType297082' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297082[]' id='answer-id-1165737' class='answer   answerof-297082 ' value='1165737'   \/><label for='answer-id-1165737' id='answer-label-1165737' class=' answer'><span>Change the replication configuration to use the key in us-east-1 to encrypt the objects that are in the destination S3 bucket.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297082[]' id='answer-id-1165738' class='answer   answerof-297082 ' value='1165738'   \/><label for='answer-id-1165738' id='answer-label-1165738' class=' answer'><span>Grant the IAM role the kms. Encrypt permission for the key in us-east-1 that encrypts source objects.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297082[]' id='answer-id-1165739' class='answer   answerof-297082 ' value='1165739'   \/><label for='answer-id-1165739' id='answer-label-1165739' class=' answer'><span>Grant the IAM role the s3 GetObjectVersionForReplication permission for objects that are in the source S3 bucket.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297082[]' id='answer-id-1165740' class='answer   answerof-297082 ' value='1165740'   \/><label for='answer-id-1165740' id='answer-label-1165740' class=' answer'><span>Grant the IAM role the kms. Decrypt permission for the key in us-east-1 that encrypts source objects.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297082[]' id='answer-id-1165741' class='answer   answerof-297082 ' value='1165741'   \/><label for='answer-id-1165741' id='answer-label-1165741' class=' answer'><span>Change the key policy of the key in us-east-1 to grant the kms. Decrypt permission to the security engineer's IAM account.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297082[]' id='answer-id-1165742' class='answer   answerof-297082 ' value='1165742'   \/><label for='answer-id-1165742' id='answer-label-1165742' class=' answer'><span>Grant the IAM role the kms Encrypt permission for the key in us-west-2 that encrypts objects that are in the destination S3 bucket.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-62' style=';'><div id='questionWrap-62'  class='   watupro-question-id-297083'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>62. <\/span>A company uses an Amazon S3 bucket to store reports Management has mandated that all new objects stored in this bucket must be encrypted at rest using server-side encryption with a client-specified IAM Key Management Service (IAM KMS) CMK owned by the same account as the S3 bucket. The IAM account number is 111122223333, and the bucket name Is report bucket. The company's security specialist must write the S3 bucket policy to ensure the mandate can be Implemented <br \/>\r<br>Which statement should the security specialist include in the policy? <br \/>\r<br>A) <br \/>\r<br><br><img decoding=\"async\" width=342 height=145 id=\"\u56fe\u7247 42\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image023-25.jpg\"><br><br \/>\r<br>B) <br \/>\r<br><br><img decoding=\"async\" width=598 height=145 id=\"\u56fe\u7247 41\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image024-23.jpg\"><br><br \/>\r<br>C) <br \/>\r<br><br><img decoding=\"async\" width=349 height=144 id=\"\u56fe\u7247 40\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image025-21.jpg\"><br><br \/>\r<br>D) <br \/>\r<br><br><img decoding=\"async\" width=599 height=145 id=\"\u56fe\u7247 39\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image026-21.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_62' value='297083' \/><input type='hidden' id='answerType297083' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297083[]' id='answer-id-1165743' class='answer   answerof-297083 ' value='1165743'   \/><label for='answer-id-1165743' id='answer-label-1165743' class=' answer'><span>Option A<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297083[]' id='answer-id-1165744' class='answer   answerof-297083 ' value='1165744'   \/><label for='answer-id-1165744' id='answer-label-1165744' class=' answer'><span>Option B<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297083[]' id='answer-id-1165745' class='answer   answerof-297083 ' value='1165745'   \/><label for='answer-id-1165745' id='answer-label-1165745' class=' answer'><span>Option C<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297083[]' id='answer-id-1165746' class='answer   answerof-297083 ' value='1165746'   \/><label for='answer-id-1165746' id='answer-label-1165746' class=' answer'><span>Option D<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-63' style=';'><div id='questionWrap-63'  class='   watupro-question-id-297084'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>63. <\/span>A developer 15 building a serverless application hosted on IAM that uses Amazon Redshift in a data store. The application has separate modules for read\/write and read-only functionality. The modules need their own database users tor compliance reasons. <br \/>\r<br>Which combination of steps should a security engineer implement to grant appropriate access' (Select TWO)<\/div><input type='hidden' name='question_id[]' id='qID_63' value='297084' \/><input type='hidden' id='answerType297084' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297084[]' id='answer-id-1165747' class='answer   answerof-297084 ' value='1165747'   \/><label for='answer-id-1165747' id='answer-label-1165747' class=' answer'><span>Configure cluster security groups for each application module to control access to database users that are required for read-only and read\/write.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297084[]' id='answer-id-1165748' class='answer   answerof-297084 ' value='1165748'   \/><label for='answer-id-1165748' id='answer-label-1165748' class=' answer'><span>Configure a VPC endpoint for Amazon Redshift Configure an endpoint policy that maps database users to each application module, and allow access to the tables that are required for read-only and read\/write<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297084[]' id='answer-id-1165749' class='answer   answerof-297084 ' value='1165749'   \/><label for='answer-id-1165749' id='answer-label-1165749' class=' answer'><span>Configure an IAM poky for each module Specify the ARN of an Amazon Redshift database user that allows the GetClusterCredentials API call<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297084[]' id='answer-id-1165750' class='answer   answerof-297084 ' value='1165750'   \/><label for='answer-id-1165750' id='answer-label-1165750' class=' answer'><span>Create focal database users for each module<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297084[]' id='answer-id-1165751' class='answer   answerof-297084 ' value='1165751'   \/><label for='answer-id-1165751' id='answer-label-1165751' class=' answer'><span>Configure an IAM policy for each module Specify the ARN of an IAM user that allows the GetClusterCredentials API call<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-64' style=';'><div id='questionWrap-64'  class='   watupro-question-id-297085'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>64. <\/span>Your company uses IAM to host its resources. <br \/>\r<br>They have the following requirements <br \/>\r<br>1) Record all API calls and Transitions <br \/>\r<br>2) Help in understanding what resources are there in the account <br \/>\r<br>3) Facility to allow auditing credentials and logins <br \/>\r<br>Which services would suffice the above requirements Please select:<\/div><input type='hidden' name='question_id[]' id='qID_64' value='297085' \/><input type='hidden' id='answerType297085' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297085[]' id='answer-id-1165752' class='answer   answerof-297085 ' value='1165752'   \/><label for='answer-id-1165752' id='answer-label-1165752' class=' answer'><span>IAM Inspector, CloudTrail, IAM Credential Reports<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297085[]' id='answer-id-1165753' class='answer   answerof-297085 ' value='1165753'   \/><label for='answer-id-1165753' id='answer-label-1165753' class=' answer'><span>CloudTrail. IAM Credential Reports, IAM SNS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297085[]' id='answer-id-1165754' class='answer   answerof-297085 ' value='1165754'   \/><label for='answer-id-1165754' id='answer-label-1165754' class=' answer'><span>CloudTrail, IAM Config, IAM Credential Reports<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297085[]' id='answer-id-1165755' class='answer   answerof-297085 ' value='1165755'   \/><label for='answer-id-1165755' id='answer-label-1165755' class=' answer'><span>IAM SQS, IAM Credential Reports, CloudTrail<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-65' style=';'><div id='questionWrap-65'  class='   watupro-question-id-297086'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>65. <\/span>A company is designing a multi-account structure for its development teams. The company is using AWS Organizations and AWS Single Sign-On (AWS SSO). The company must implement a solution so that the development teams can use only specific AWS Regions and so that each AWS account allows access to only specific AWS services. <br \/>\r<br>Which solution will meet these requirements with the LEAST operational overhead?<\/div><input type='hidden' name='question_id[]' id='qID_65' value='297086' \/><input type='hidden' id='answerType297086' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297086[]' id='answer-id-1165756' class='answer   answerof-297086 ' value='1165756'   \/><label for='answer-id-1165756' id='answer-label-1165756' class=' answer'><span>Use AWS SSO to set up service-linked roles with IAM policy statements that include the Condition, Resource, and NotAction elements to allow access to only the Regions and services that are needed.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297086[]' id='answer-id-1165757' class='answer   answerof-297086 ' value='1165757'   \/><label for='answer-id-1165757' id='answer-label-1165757' class=' answer'><span>Deactivate AWS Security Token Service (AWS STS) in Regions that the developers are not allowed to use.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297086[]' id='answer-id-1165758' class='answer   answerof-297086 ' value='1165758'   \/><label for='answer-id-1165758' id='answer-label-1165758' class=' answer'><span>Create SCPs that include the Condition, Resource, and NotAction elements to allow access to only the Regions and services that are needed.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297086[]' id='answer-id-1165759' class='answer   answerof-297086 ' value='1165759'   \/><label for='answer-id-1165759' id='answer-label-1165759' class=' answer'><span>For each AWS account, create tailored identity-based policies for AWS SS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297086[]' id='answer-id-1165760' class='answer   answerof-297086 ' value='1165760'   \/><label for='answer-id-1165760' id='answer-label-1165760' class=' answer'><span>Use statements that include the Condition, Resource, and NotAction elements to allow access to only the Regions and services that are needed.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-66' style=';'><div id='questionWrap-66'  class='   watupro-question-id-297087'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>66. <\/span>A company has deployed Amazon GuardDuty and now wants to implement automation for potential threats. The company has decided to start with RDP brute force attacks that come from Amazon EC2 instances in the company\u2019s AWS environment. A security engineer needs to implement a solution that blocks the detected communication from a suspicious instance until investigation and potential remediation can occur. <br \/>\r<br>Which solution will meet these requirements?<\/div><input type='hidden' name='question_id[]' id='qID_66' value='297087' \/><input type='hidden' id='answerType297087' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297087[]' id='answer-id-1165761' class='answer   answerof-297087 ' value='1165761'   \/><label for='answer-id-1165761' id='answer-label-1165761' class=' answer'><span>Configure GuardDuty to send the event to an Amazon Kinesis data stream. Process the event with an \r\nAmazon Kinesis Data Analytics for Apache Flink application that sends a notification to the company through Amazon Simple Notification Service (Amazon SNS). Add rules to the network ACL to block traffic to and from the suspicious instance.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297087[]' id='answer-id-1165762' class='answer   answerof-297087 ' value='1165762'   \/><label for='answer-id-1165762' id='answer-label-1165762' class=' answer'><span>Configure GuardDuty to send the event to Amazon EventBridge (Amazon CloudWatch Events). Deploy an AWS WAF web AC<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297087[]' id='answer-id-1165763' class='answer   answerof-297087 ' value='1165763'   \/><label for='answer-id-1165763' id='answer-label-1165763' class=' answer'><span>Process the event with an AWS Lambda function that sends a notification to the company through Amazon Simple Notification Service (Amazon SNS) and adds a web ACL rule to block traffic to and from the suspicious instance.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297087[]' id='answer-id-1165764' class='answer   answerof-297087 ' value='1165764'   \/><label for='answer-id-1165764' id='answer-label-1165764' class=' answer'><span>Enable AWS Security Hub to ingest GuardDuty findings and send the event to Amazon EventBridge (Amazon CloudWatch Events). Deploy AWS Network Firewall. Process the event with an AWS Lambda function that adds a rule to a Network Firewall firewall policy to block traffic to and from the suspicious instance.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297087[]' id='answer-id-1165765' class='answer   answerof-297087 ' value='1165765'   \/><label for='answer-id-1165765' id='answer-label-1165765' class=' answer'><span>Enable AWS Security Hub to ingest GuardDuty findings. Configure an Amazon Kinesis data stream as an event destination for Security Hub. Process the event with an AWS Lambda function that replaces the security group of the suspicious instance with a security group that does not allow any connections.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-67' style=';'><div id='questionWrap-67'  class='   watupro-question-id-297088'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>67. <\/span>A company uses an external identity provider to allow federation into different IAM accounts. A security engineer for the company needs to identify the federated user that terminated a production Amazon EC2 instance a week ago. <br \/>\r<br>What is the FASTEST way for the security engineer to identify the federated user?<\/div><input type='hidden' name='question_id[]' id='qID_67' value='297088' \/><input type='hidden' id='answerType297088' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297088[]' id='answer-id-1165766' class='answer   answerof-297088 ' value='1165766'   \/><label for='answer-id-1165766' id='answer-label-1165766' class=' answer'><span>Review the IAM CloudTrail event history logs in an Amazon S3 bucket and look for the Terminatelnstances event to identify the federated user from the role session name.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297088[]' id='answer-id-1165767' class='answer   answerof-297088 ' value='1165767'   \/><label for='answer-id-1165767' id='answer-label-1165767' class=' answer'><span>Filter the IAM CloudTrail event history for the Terminatelnstances event and identify the assumed IAM role. Review the AssumeRoleWithSAML event call in CloudTrail to identify the corresponding username.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297088[]' id='answer-id-1165768' class='answer   answerof-297088 ' value='1165768'   \/><label for='answer-id-1165768' id='answer-label-1165768' class=' answer'><span>Search the IAM CloudTrail logs for the Terminatelnstances event and note the event time. Review the IAM Access Advisor tab for all federated roles. The last accessed time should match the time when the instance was terminated.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297088[]' id='answer-id-1165769' class='answer   answerof-297088 ' value='1165769'   \/><label for='answer-id-1165769' id='answer-label-1165769' class=' answer'><span>Use Amazon Athena to run a SQL query on the IAM CloudTrail logs stored in an Amazon S3 bucket and filter on the Terminatelnstances event. Identify the corresponding role and run another query to filter the AssumeRoleWithWebldentity event for the user name.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-68' style=';'><div id='questionWrap-68'  class='   watupro-question-id-297089'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>68. <\/span>A company Is planning to use Amazon Elastic File System (Amazon EFS) with its on-premises servers. The company has an existing IAM Direct Connect connection established between its on-premises data center and an IAM Region Security policy states that the company's on-premises firewall should only have specific IP addresses added to the allow list and not a CIDR range. The company also wants to restrict access so that only certain data center-based servers have access to Amazon EFS <br \/>\r<br>How should a security engineer implement this solution''<\/div><input type='hidden' name='question_id[]' id='qID_68' value='297089' \/><input type='hidden' id='answerType297089' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297089[]' id='answer-id-1165770' class='answer   answerof-297089 ' value='1165770'   \/><label for='answer-id-1165770' id='answer-label-1165770' class=' answer'><span>Add the file-system-id efs IAM-region amazonIAM com URL to the allow list for the data center firewall Install the IAM CLI on the data center-based servers to mount the EFS file system in the EFS security group add the data center IP range to the allow list Mount the EFS using the EFS file system name<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297089[]' id='answer-id-1165771' class='answer   answerof-297089 ' value='1165771'   \/><label for='answer-id-1165771' id='answer-label-1165771' class=' answer'><span>Assign an Elastic IP address to Amazon EFS and add the Elastic IP address to the allow list for the data center firewall Install the IAM CLI on the data center-based servers to mount the EFS file system In the EFS security group, add the IP addresses of the data center servers to the allow list Mount the EFS using the Elastic IP address<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297089[]' id='answer-id-1165772' class='answer   answerof-297089 ' value='1165772'   \/><label for='answer-id-1165772' id='answer-label-1165772' class=' answer'><span>Add the EFS file system mount target IP addresses to the allow list for the data center firewall In the EFS security group, add the data center server IP addresses to the allow list Use the Linux terminal to mount the EFS file system using the IP address of one of the mount targets<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297089[]' id='answer-id-1165773' class='answer   answerof-297089 ' value='1165773'   \/><label for='answer-id-1165773' id='answer-label-1165773' class=' answer'><span>Assign a static range of IP addresses for the EFS file system by contacting IAM Support In the EFS security group add the data center server IP addresses to the allow list Use the Linux terminal to mount the EFS file system using one of the static IP addresses<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-69' style=';'><div id='questionWrap-69'  class='   watupro-question-id-297090'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>69. <\/span>A website currently runs on Amazon EC2, wan mostly statics content on the site. Recently the site was subjected to a DDoS attack a security engineer was (asked was redesigning the edge security to help Mitigate this risk in the future. <br \/>\r<br>What are some ways the engineer could achieve this (Select THREE)?<\/div><input type='hidden' name='question_id[]' id='qID_69' value='297090' \/><input type='hidden' id='answerType297090' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297090[]' id='answer-id-1165774' class='answer   answerof-297090 ' value='1165774'   \/><label for='answer-id-1165774' id='answer-label-1165774' class=' answer'><span>Use IAM X-Ray to inspect the trafc going to the EC2 instances.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297090[]' id='answer-id-1165775' class='answer   answerof-297090 ' value='1165775'   \/><label for='answer-id-1165775' id='answer-label-1165775' class=' answer'><span>Move the static content to Amazon S3, and front this with an Amazon Cloud Front distribution.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297090[]' id='answer-id-1165776' class='answer   answerof-297090 ' value='1165776'   \/><label for='answer-id-1165776' id='answer-label-1165776' class=' answer'><span>Change the security group conguration to block the source of the attack trafc<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297090[]' id='answer-id-1165777' class='answer   answerof-297090 ' value='1165777'   \/><label for='answer-id-1165777' id='answer-label-1165777' class=' answer'><span>Use IAM WAF security rules to inspect the inbound trafc.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297090[]' id='answer-id-1165778' class='answer   answerof-297090 ' value='1165778'   \/><label for='answer-id-1165778' id='answer-label-1165778' class=' answer'><span>Use Amazon Inspector assessment templates to inspect the inbound traffic.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297090[]' id='answer-id-1165779' class='answer   answerof-297090 ' value='1165779'   \/><label for='answer-id-1165779' id='answer-label-1165779' class=' answer'><span>Use Amazon Route 53 to distribute trafc.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-70' style=';'><div id='questionWrap-70'  class='   watupro-question-id-297091'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>70. <\/span>A company needs to use HTTPS when connecting to its web applications to meet compliance requirements. These web applications run in Amazon VPC on Amazon EC2 instances behind an Application Load Balancer (ALB). A security engineer wants to ensure that the load balancer win only accept connections over port 443. even if the ALB is mistakenly configured with an HTTP listener <br \/>\r<br>Which configuration steps should the security engineer take to accomplish this task?<\/div><input type='hidden' name='question_id[]' id='qID_70' value='297091' \/><input type='hidden' id='answerType297091' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297091[]' id='answer-id-1165780' class='answer   answerof-297091 ' value='1165780'   \/><label for='answer-id-1165780' id='answer-label-1165780' class=' answer'><span>Create a security group with a rule that denies Inbound connections from 0.0.0 0\/0 on port 00. Attach this security group to the ALB to overwrite more permissive rules from the ALB's default security \r\ngroup.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297091[]' id='answer-id-1165781' class='answer   answerof-297091 ' value='1165781'   \/><label for='answer-id-1165781' id='answer-label-1165781' class=' answer'><span>Create a network ACL that denies inbound connections from 0 0.0.0\/0 on port 80 Associate the network ACL with the VPC s internet gateway<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297091[]' id='answer-id-1165782' class='answer   answerof-297091 ' value='1165782'   \/><label for='answer-id-1165782' id='answer-label-1165782' class=' answer'><span>Create a network ACL that allows outbound connections to the VPC IP range on port 443 only. Associate the network ACL with the VPC's internet gateway.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297091[]' id='answer-id-1165783' class='answer   answerof-297091 ' value='1165783'   \/><label for='answer-id-1165783' id='answer-label-1165783' class=' answer'><span>Create a security group with a single inbound rule that allows connections from 0.0.0 0\/0 on port 443. Ensure this security group is the only one associated with the ALB<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-71' style=';'><div id='questionWrap-71'  class='   watupro-question-id-297092'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>71. <\/span>Example.com is hosted on Amazon EC2 instances behind an Application Load Balancer (ALB). Third-party host intrusion detection system (HIDS) agents that capture the traffic of the EC2 instance are running on each host. The company must ensure they are using privacy enhancing technologies for users, without losing the assurance the third-party solution offers. <br \/>\r<br>What is the MOST secure way to meet these requirements?<\/div><input type='hidden' name='question_id[]' id='qID_71' value='297092' \/><input type='hidden' id='answerType297092' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297092[]' id='answer-id-1165784' class='answer   answerof-297092 ' value='1165784'   \/><label for='answer-id-1165784' id='answer-label-1165784' class=' answer'><span>Enable TLS pass through on the ALB, and handle decryption at the server using Elliptic Curve Diffie-Hellman (ECDHE) cipher suites.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297092[]' id='answer-id-1165785' class='answer   answerof-297092 ' value='1165785'   \/><label for='answer-id-1165785' id='answer-label-1165785' class=' answer'><span>Create a listener on the ALB that uses encrypted connections with Elliptic Curve Diffie-Hellman (ECDHE) cipher suites, and pass the traffic in the clear to the server.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297092[]' id='answer-id-1165786' class='answer   answerof-297092 ' value='1165786'   \/><label for='answer-id-1165786' id='answer-label-1165786' class=' answer'><span>Create a listener on the ALB that uses encrypted connections with Elliptic Curve Diffie-Hellman (ECDHE) cipher suites, and use encrypted connections to the servers that do not enable Perfect Forward Secrecy (PFS).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297092[]' id='answer-id-1165787' class='answer   answerof-297092 ' value='1165787'   \/><label for='answer-id-1165787' id='answer-label-1165787' class=' answer'><span>Create a listener on the ALB that does not enable Perfect Forward Secrecy (PFS) cipher suites, and use encrypted connections to the servers using Elliptic Curve Diffie-Hellman (ECDHE) cipher suites.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-72' style=';'><div id='questionWrap-72'  class='   watupro-question-id-297093'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>72. <\/span>A company has an AWS Key Management Service (AWS KMS) customer managed key with imported key material Company policy requires all encryption keys to be rotated every year <br \/>\r<br>What should a security engineer do to meet this requirement for this customer managed key? <br \/>\r<br>A. Enable automatic key rotation annually for the existing customer managed key <br \/>\r<br>B. Use the AWS CLI to create an AWS Lambda function to rotate the existing customer managed key annually <br \/>\r<br>C. Import new key material to the existing customer managed key Manually rotate the key <br \/>\r<br>D. Create a new customer managed key Import new key material to the new key Point the key alias to the new key<\/div><input type='hidden' name='question_id[]' id='qID_72' value='297093' \/><input type='hidden' id='answerType297093' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-297093[]' id='textarea_q_297093' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-73' style=';'><div id='questionWrap-73'  class='   watupro-question-id-297094'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>73. <\/span>A company's on-premises networks are connected to VPCs using an IAM Direct Connect gateway. The company's on-premises application needs to stream data using an existing Amazon Kinesis Data Firehose delivery stream. The company's security policy requires that data be encrypted in transit using a private network. <br \/>\r<br>How should the company meet these requirements?<\/div><input type='hidden' name='question_id[]' id='qID_73' value='297094' \/><input type='hidden' id='answerType297094' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297094[]' id='answer-id-1165789' class='answer   answerof-297094 ' value='1165789'   \/><label for='answer-id-1165789' id='answer-label-1165789' class=' answer'><span>Create a VPC endpoint tor Kinesis Data Firehose. Configure the application to connect to the VPC endpoint.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297094[]' id='answer-id-1165790' class='answer   answerof-297094 ' value='1165790'   \/><label for='answer-id-1165790' id='answer-label-1165790' class=' answer'><span>Configure an IAM policy to restrict access to Kinesis Data Firehose using a source IP condition. Configure the application to connect to the existing Firehose delivery stream.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297094[]' id='answer-id-1165791' class='answer   answerof-297094 ' value='1165791'   \/><label for='answer-id-1165791' id='answer-label-1165791' class=' answer'><span>Create a new TLS certificate in IAM Certificate Manager (ACM). Create a public-facing Network Load Balancer (NLB) and select the newly created TLS certificate. Configure the NLB to forward all traffic to Kinesis Data Firehose. Configure the application to connect to the NL<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297094[]' id='answer-id-1165792' class='answer   answerof-297094 ' value='1165792'   \/><label for='answer-id-1165792' id='answer-label-1165792' class=' answer'><span>Peer the on-premises network with the Kinesis Data Firehose VPC using Direct Connect. Configure the application to connect to the existing Firehose delivery stream.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-74' style=';'><div id='questionWrap-74'  class='   watupro-question-id-297095'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>74. <\/span>A security team is using Amazon EC2 Image Builder to build a hardened AMI with forensic capabilities. An AWS Key Management Service (AWS KMS) key will encrypt the forensic AMI EC2 Image Builder successfully installs the required patches and packages in the security team's AWS account. The security team uses a federated IAM role m the same AWS account to sign in to the AWS Management Console and attempts to launch the forensic AMI. The EC2 instance launches and immediately terminates. <br \/>\r<br>What should the security learn do lo launch the EC2 instance successfully<\/div><input type='hidden' name='question_id[]' id='qID_74' value='297095' \/><input type='hidden' id='answerType297095' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297095[]' id='answer-id-1165793' class='answer   answerof-297095 ' value='1165793'   \/><label for='answer-id-1165793' id='answer-label-1165793' class=' answer'><span>Update the policy that is associated with the federated IAM role to allow the ec2. Describelmages action for the forensic AM<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297095[]' id='answer-id-1165794' class='answer   answerof-297095 ' value='1165794'   \/><label for='answer-id-1165794' id='answer-label-1165794' class=' answer'><span>Update the policy that is associated with the federated IAM role to allow the ec2 Start Instances action m the security team's AWS account.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297095[]' id='answer-id-1165795' class='answer   answerof-297095 ' value='1165795'   \/><label for='answer-id-1165795' id='answer-label-1165795' class=' answer'><span>Update the policy that is associated with the KMS key that is used to encrypt the forensic AM<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297095[]' id='answer-id-1165796' class='answer   answerof-297095 ' value='1165796'   \/><label for='answer-id-1165796' id='answer-label-1165796' class=' answer'><span>Configure the policy to allow the kms. Encrypt and kms Decrypt actions for the federated IAM role.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297095[]' id='answer-id-1165797' class='answer   answerof-297095 ' value='1165797'   \/><label for='answer-id-1165797' id='answer-label-1165797' class=' answer'><span>Update the policy that is associated with the federated IAM role to allow the kms. DescribeKey action for the KMS key that is used to encrypt the forensic AM<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-75' style=';'><div id='questionWrap-75'  class='   watupro-question-id-297096'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>75. <\/span>A company wants to monitor the deletion of customer managed CMKs A security engineer must create an alarm that will notify the company before a CMK is deleted. The security engineer has configured the integration of IAM CloudTrail with Amazon CloudWatch <br \/>\r<br>What should the security engineer do next to meet this requirement?<\/div><input type='hidden' name='question_id[]' id='qID_75' value='297096' \/><input type='hidden' id='answerType297096' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297096[]' id='answer-id-1165798' class='answer   answerof-297096 ' value='1165798'   \/><label for='answer-id-1165798' id='answer-label-1165798' class=' answer'><span>Use inbound rule 100 to allow traffic on TCP port 443 Use inbound rule 200 to deny traffic on TCP port 3306 Use outbound rule 100 to allow traffic on TCP port 443<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297096[]' id='answer-id-1165799' class='answer   answerof-297096 ' value='1165799'   \/><label for='answer-id-1165799' id='answer-label-1165799' class=' answer'><span>Use inbound rule 100 to deny traffic on TCP port 3306. Use inbound rule 200 to allow traffic on TCP port range 1024-65535. Use outbound rule 100 to allow traffic on TCP port 443<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297096[]' id='answer-id-1165800' class='answer   answerof-297096 ' value='1165800'   \/><label for='answer-id-1165800' id='answer-label-1165800' class=' answer'><span>Use inbound rule 100 to allow traffic on TCP port range 1024-65535 Use inbound rule 200 to deny \r\ntraffic on TCP port 3306 Use outbound rule 100 to allow traffic on TCP port 443<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297096[]' id='answer-id-1165801' class='answer   answerof-297096 ' value='1165801'   \/><label for='answer-id-1165801' id='answer-label-1165801' class=' answer'><span>Use inbound rule 100 to deny traffic on TCP port 3306 Use inbound rule 200 to allow traffic on TCP port 443 Use outbound rule 100 to allow traffic on TCP port 443<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-76' style=';'><div id='questionWrap-76'  class='   watupro-question-id-297097'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>76. <\/span>A company is building an application on IAM that will store sensitive Information. The company has a support team with access to the IT infrastructure, including databases. The company's security engineer must introduce measures to protect the sensitive data against any data breach while minimizing management overhead. The credentials must be regularly rotated. <br \/>\r<br>What should the security engineer recommend?<\/div><input type='hidden' name='question_id[]' id='qID_76' value='297097' \/><input type='hidden' id='answerType297097' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297097[]' id='answer-id-1165802' class='answer   answerof-297097 ' value='1165802'   \/><label for='answer-id-1165802' id='answer-label-1165802' class=' answer'><span>Enable Amazon RDS encryption to encrypt the database and snapshots. Enable Amazon Elastic Block Store (Amazon EBS) encryption on Amazon EC2 instances. Include the database credential in the EC2 user data field. Use an IAM Lambda function to rotate database credentials. Set up TLS for the connection to the database.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297097[]' id='answer-id-1165803' class='answer   answerof-297097 ' value='1165803'   \/><label for='answer-id-1165803' id='answer-label-1165803' class=' answer'><span>Install a database on an Amazon EC2 Instance. Enable third-party disk encryption to encrypt the Amazon Elastic Block Store (Amazon EBS) volume. Store the database credentials in IAM CloudHSM with automatic rotation. Set up TLS for the connection to the database.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297097[]' id='answer-id-1165804' class='answer   answerof-297097 ' value='1165804'   \/><label for='answer-id-1165804' id='answer-label-1165804' class=' answer'><span>Enable Amazon RDS encryption to encrypt the database and snapshots. Enable Amazon Elastic Block Store (Amazon EBS) encryption on Amazon EC2 instances. Store the database credentials in IAM Secrets Manager with automatic rotation. Set up TLS for the connection to the RDS hosted database.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297097[]' id='answer-id-1165805' class='answer   answerof-297097 ' value='1165805'   \/><label for='answer-id-1165805' id='answer-label-1165805' class=' answer'><span>Set up an IAM CloudHSM cluster with IAM Key Management Service (IAM KMS) to store KMS keys. Set up Amazon RDS encryption using IAM KMS to encrypt the database. Store database credentials in the IAM Systems Manager Parameter Store with automatic rotation. Set up TLS for the connection to the RDS hosted database.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-77' style=';'><div id='questionWrap-77'  class='   watupro-question-id-297098'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>77. <\/span>A company deployed IAM Organizations to help manage its increasing number of IAM accounts. A security engineer wants to ensure only principals in the Organization structure can access a specic Amazon S3 bucket. The solution must also minimize operational overhead <br \/>\r<br>Which solution will meet these requirements?<\/div><input type='hidden' name='question_id[]' id='qID_77' value='297098' \/><input type='hidden' id='answerType297098' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297098[]' id='answer-id-1165806' class='answer   answerof-297098 ' value='1165806'   \/><label for='answer-id-1165806' id='answer-label-1165806' class=' answer'><span>1 Put all users into an IAM group with an access policy granting access to the J bucket.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297098[]' id='answer-id-1165807' class='answer   answerof-297098 ' value='1165807'   \/><label for='answer-id-1165807' id='answer-label-1165807' class=' answer'><span>Have the account creation trigger an IAM Lambda function that manages the bucket policy, allowing access to accounts listed in the policy only.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297098[]' id='answer-id-1165808' class='answer   answerof-297098 ' value='1165808'   \/><label for='answer-id-1165808' id='answer-label-1165808' class=' answer'><span>Add an SCP to the Organizations master account, allowing all principals access to the bucket.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297098[]' id='answer-id-1165809' class='answer   answerof-297098 ' value='1165809'   \/><label for='answer-id-1165809' id='answer-label-1165809' class=' answer'><span>Specify the organization ID in the global key condition element of a bucket policy, allowing all principals access.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-78' style=';'><div id='questionWrap-78'  class='   watupro-question-id-297099'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>78. <\/span>A company is undergoing a layer 3 and layer 4 DDoS attack on its web servers running on IAM. <br \/>\r<br>Which combination of IAM services and features will provide protection in this scenario? (Select THREE).<\/div><input type='hidden' name='question_id[]' id='qID_78' value='297099' \/><input type='hidden' id='answerType297099' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297099[]' id='answer-id-1165810' class='answer   answerof-297099 ' value='1165810'   \/><label for='answer-id-1165810' id='answer-label-1165810' class=' answer'><span>Amazon Route 53<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297099[]' id='answer-id-1165811' class='answer   answerof-297099 ' value='1165811'   \/><label for='answer-id-1165811' id='answer-label-1165811' class=' answer'><span>IAM Certificate Manager (ACM)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297099[]' id='answer-id-1165812' class='answer   answerof-297099 ' value='1165812'   \/><label for='answer-id-1165812' id='answer-label-1165812' class=' answer'><span>Amazon S3<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297099[]' id='answer-id-1165813' class='answer   answerof-297099 ' value='1165813'   \/><label for='answer-id-1165813' id='answer-label-1165813' class=' answer'><span>IAM Shield<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297099[]' id='answer-id-1165814' class='answer   answerof-297099 ' value='1165814'   \/><label for='answer-id-1165814' id='answer-label-1165814' class=' answer'><span>Elastic Load Balancer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297099[]' id='answer-id-1165815' class='answer   answerof-297099 ' value='1165815'   \/><label for='answer-id-1165815' id='answer-label-1165815' class=' answer'><span>Amazon Guard Duty<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-79' style=';'><div id='questionWrap-79'  class='   watupro-question-id-297100'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>79. <\/span>Your CTO thinks your IAM account was hacked. <br \/>\r<br>What is the only way to know for certain if there was unauthorized access and what they did, assuming your hackers are very sophisticated IAM engineers and doing everything they can to cover their tracks?<\/div><input type='hidden' name='question_id[]' id='qID_79' value='297100' \/><input type='hidden' id='answerType297100' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297100[]' id='answer-id-1165816' class='answer   answerof-297100 ' value='1165816'   \/><label for='answer-id-1165816' id='answer-label-1165816' class=' answer'><span>Use CloudTrail Log File Integrity Validation.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297100[]' id='answer-id-1165817' class='answer   answerof-297100 ' value='1165817'   \/><label for='answer-id-1165817' id='answer-label-1165817' class=' answer'><span>Use IAM Config SNS Subscriptions and process events in real time.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297100[]' id='answer-id-1165818' class='answer   answerof-297100 ' value='1165818'   \/><label for='answer-id-1165818' id='answer-label-1165818' class=' answer'><span>Use CloudTrail backed up to IAM S3 and Glacier.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297100[]' id='answer-id-1165819' class='answer   answerof-297100 ' value='1165819'   \/><label for='answer-id-1165819' id='answer-label-1165819' class=' answer'><span>Use IAM Config Timeline forensics.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-80' style=';'><div id='questionWrap-80'  class='   watupro-question-id-297101'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>80. <\/span>A company is developing a highly resilient application to be hosted on multiple Amazon EC2 instances. The application will store highly sensitive user data in Amazon RDS tables <br \/>\r<br>The application must <br \/>\r<br>&#8226; Include migration to a different IAM Region in the application disaster recovery plan. <br \/>\r<br>&#8226; Provide a full audit trail of encryption key administration events <br \/>\r<br>&#8226; Allow only company administrators to administer keys. <br \/>\r<br>&#8226; Protect data at rest using application layer encryption <br \/>\r<br>A Security Engineer is evaluating options for encryption key management <br \/>\r<br>Why should the Security Engineer choose IAM CloudHSM over IAM KMS for encryption key management in this situation?<\/div><input type='hidden' name='question_id[]' id='qID_80' value='297101' \/><input type='hidden' id='answerType297101' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297101[]' id='answer-id-1165820' class='answer   answerof-297101 ' value='1165820'   \/><label for='answer-id-1165820' id='answer-label-1165820' class=' answer'><span>The key administration event logging generated by CloudHSM is significantly more extensive than IAM KM<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297101[]' id='answer-id-1165821' class='answer   answerof-297101 ' value='1165821'   \/><label for='answer-id-1165821' id='answer-label-1165821' class=' answer'><span>CloudHSM ensures that only company support staff can administer encryption keys, whereas IAM KMS allows IAM staff to administer keys<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297101[]' id='answer-id-1165822' class='answer   answerof-297101 ' value='1165822'   \/><label for='answer-id-1165822' id='answer-label-1165822' class=' answer'><span>The ciphertext produced by CloudHSM provides more robust protection against brute force decryption attacks than the ciphertext produced by IAM KMS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297101[]' id='answer-id-1165823' class='answer   answerof-297101 ' value='1165823'   \/><label for='answer-id-1165823' id='answer-label-1165823' class=' answer'><span>CloudHSM provides the ability to copy keys to a different Region, whereas IAM KMS does not<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-81' style=';'><div id='questionWrap-81'  class='   watupro-question-id-297102'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>81. <\/span>A company wants to ensure that its IAM resources can be launched only in the us-east-1 and us-west-2 Regions. <br \/>\r<br>What is the MOST operationally efficient solution that will prevent developers from launching Amazon EC2 instances in other Regions?<\/div><input type='hidden' name='question_id[]' id='qID_81' value='297102' \/><input type='hidden' id='answerType297102' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297102[]' id='answer-id-1165824' class='answer   answerof-297102 ' value='1165824'   \/><label for='answer-id-1165824' id='answer-label-1165824' class=' answer'><span>Enable Amazon GuardDuty in all Regions. Create alerts to detect unauthorized activity outside us-east-1 and us-west-2.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297102[]' id='answer-id-1165825' class='answer   answerof-297102 ' value='1165825'   \/><label for='answer-id-1165825' id='answer-label-1165825' class=' answer'><span>Use an organization in IAM Organizations. Attach an SCP that allows all actions when the IAM: Requested Region condition key is either us-east-1 or us-west-2. Delete the FullIAMAccess policy.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297102[]' id='answer-id-1165826' class='answer   answerof-297102 ' value='1165826'   \/><label for='answer-id-1165826' id='answer-label-1165826' class=' answer'><span>Provision EC2 resources by using IAM Cloud Formation templates through IAM CodePipeline. Allow only the values of us-east-1 and us-west-2 in the IAM CloudFormation template's parameters.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297102[]' id='answer-id-1165827' class='answer   answerof-297102 ' value='1165827'   \/><label for='answer-id-1165827' id='answer-label-1165827' class=' answer'><span>Create an IAM Config rule to prevent unauthorized activity outside us-east-1 and us-west-2.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-82' style=';'><div id='questionWrap-82'  class='   watupro-question-id-297103'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>82. <\/span>A company's Security Team received an email notification from the Amazon EC2 Abuse team that one or more of the company's Amazon EC2 instances may have been compromised <br \/>\r<br>Which combination of actions should the Security team take to respond to (be current modem? (Select TWO.)<\/div><input type='hidden' name='question_id[]' id='qID_82' value='297103' \/><input type='hidden' id='answerType297103' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297103[]' id='answer-id-1165828' class='answer   answerof-297103 ' value='1165828'   \/><label for='answer-id-1165828' id='answer-label-1165828' class=' answer'><span>Open a support case with the IAM Security team and ask them to remove the malicious code from the affected instance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297103[]' id='answer-id-1165829' class='answer   answerof-297103 ' value='1165829'   \/><label for='answer-id-1165829' id='answer-label-1165829' class=' answer'><span>Respond to the notification and list the actions that have been taken to address the incident<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297103[]' id='answer-id-1165830' class='answer   answerof-297103 ' value='1165830'   \/><label for='answer-id-1165830' id='answer-label-1165830' class=' answer'><span>Delete all IAM users and resources in the account<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297103[]' id='answer-id-1165831' class='answer   answerof-297103 ' value='1165831'   \/><label for='answer-id-1165831' id='answer-label-1165831' class=' answer'><span>Detach the internet gateway from the VPC remove aft rules that contain 0.0.0.0V0 from the security groups, and create a NACL rule to deny all traffic Inbound from the internet<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297103[]' id='answer-id-1165832' class='answer   answerof-297103 ' value='1165832'   \/><label for='answer-id-1165832' id='answer-label-1165832' class=' answer'><span>Delete the identified compromised instances and delete any associated resources that the Security team did not create.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-83' style=';'><div id='questionWrap-83'  class='   watupro-question-id-297104'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>83. <\/span>A company is using Amazon Macie, AWS Firewall Manager, Amazon Inspector, and AWS Shield Advanced in its AWS account. The company wants to receive alerts if a DDoS attack occurs against the account. <br \/>\r<br>Which solution will meet this requirement?<\/div><input type='hidden' name='question_id[]' id='qID_83' value='297104' \/><input type='hidden' id='answerType297104' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297104[]' id='answer-id-1165833' class='answer   answerof-297104 ' value='1165833'   \/><label for='answer-id-1165833' id='answer-label-1165833' class=' answer'><span>Use Macie to detect an active DDoS event. Create Amazon CloudWatch alarms that respond to Macie findings.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297104[]' id='answer-id-1165834' class='answer   answerof-297104 ' value='1165834'   \/><label for='answer-id-1165834' id='answer-label-1165834' class=' answer'><span>Use Amazon Inspector to review resources and to invoke Amazon CloudWatch alarms for any resources that are vulnerable to DDoS attacks.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297104[]' id='answer-id-1165835' class='answer   answerof-297104 ' value='1165835'   \/><label for='answer-id-1165835' id='answer-label-1165835' class=' answer'><span>Create an Amazon CloudWatch alarm that monitors Firewall Manager metrics for an active DDoS event.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297104[]' id='answer-id-1165836' class='answer   answerof-297104 ' value='1165836'   \/><label for='answer-id-1165836' id='answer-label-1165836' class=' answer'><span>Create an Amazon CloudWatch alarm that monitors Shield Advanced metrics for an active DDoS event.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-84' style=';'><div id='questionWrap-84'  class='   watupro-question-id-297105'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>84. <\/span>A company is running internal microservices on Amazon Elastic Container Service (Amazon ECS) with the Amazon EC2 launch type. The company is using Amazon Elastic Container Registry (Amazon ECR) private repositories. <br \/>\r<br>A security engineer needs to encrypt the private repositories by using AWS Key Management Service (AWS KMS). The security engineer also needs to analyze the container images for any common vulnerabilities and exposures (CVEs). <br \/>\r<br>Which solution will meet these requirements?<\/div><input type='hidden' name='question_id[]' id='qID_84' value='297105' \/><input type='hidden' id='answerType297105' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297105[]' id='answer-id-1165837' class='answer   answerof-297105 ' value='1165837'   \/><label for='answer-id-1165837' id='answer-label-1165837' class=' answer'><span>Enable KMS encryption on the existing ECR repositories. Install Amazon Inspector Agent from the ECS container instances\u2019 user data. Run an assessment with the CVE rules.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297105[]' id='answer-id-1165838' class='answer   answerof-297105 ' value='1165838'   \/><label for='answer-id-1165838' id='answer-label-1165838' class=' answer'><span>Recreate the ECR repositories with KMS encryption and ECR scanning enabled. Analyze the scan report after the next push of images.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297105[]' id='answer-id-1165839' class='answer   answerof-297105 ' value='1165839'   \/><label for='answer-id-1165839' id='answer-label-1165839' class=' answer'><span>Recreate the ECR repositories with KMS encryption and ECR scanning enabled. Install AWS Systems \r\nManager Agent on the ECS container instances. Run an inventory report.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297105[]' id='answer-id-1165840' class='answer   answerof-297105 ' value='1165840'   \/><label for='answer-id-1165840' id='answer-label-1165840' class=' answer'><span>Enable KMS encryption on the existing ECR repositories. Use AWS Trusted Advisor to check the ECS container instances and to verily the findings against a list of current CVEs.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-85' style=';'><div id='questionWrap-85'  class='   watupro-question-id-297106'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>85. <\/span>A business stores website images in an Amazon S3 bucket. The firm serves the photos to end users through Amazon CloudFront. The firm learned lately that the photographs are being accessible from nations in which it does not have a distribution license. <br \/>\r<br>Which steps should the business take to safeguard the photographs and restrict their distribution? (Select two.)<\/div><input type='hidden' name='question_id[]' id='qID_85' value='297106' \/><input type='hidden' id='answerType297106' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297106[]' id='answer-id-1165841' class='answer   answerof-297106 ' value='1165841'   \/><label for='answer-id-1165841' id='answer-label-1165841' class=' answer'><span>Update the S3 bucket policy to restrict access to a CloudFront origin access identity (OAI).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297106[]' id='answer-id-1165842' class='answer   answerof-297106 ' value='1165842'   \/><label for='answer-id-1165842' id='answer-label-1165842' class=' answer'><span>Update the website DNS record to use an Amazon Route 53 geolocation record deny list of countries where the company lacks a license.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297106[]' id='answer-id-1165843' class='answer   answerof-297106 ' value='1165843'   \/><label for='answer-id-1165843' id='answer-label-1165843' class=' answer'><span>Add a CloudFront geo restriction deny list of countries where the company lacks a license.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297106[]' id='answer-id-1165844' class='answer   answerof-297106 ' value='1165844'   \/><label for='answer-id-1165844' id='answer-label-1165844' class=' answer'><span>Update the S3 bucket policy with a deny list of countries where the company lacks a license.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297106[]' id='answer-id-1165845' class='answer   answerof-297106 ' value='1165845'   \/><label for='answer-id-1165845' id='answer-label-1165845' class=' answer'><span>Enable the Restrict Viewer Access option in CloudFront to create a deny list of countries where the company lacks a license.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-86' style=';'><div id='questionWrap-86'  class='   watupro-question-id-297107'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>86. <\/span>A company wants to remove all SSH keys permanently from a specific subset of its Amazon Linux 2 Amazon EC2 instances that are using the same 1AM instance profile However three individuals who have IAM user accounts will need to access these instances by using an SSH session to perform critical duties <br \/>\r<br>How can a security engineer provide the access to meet these requirements?<\/div><input type='hidden' name='question_id[]' id='qID_86' value='297107' \/><input type='hidden' id='answerType297107' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297107[]' id='answer-id-1165846' class='answer   answerof-297107 ' value='1165846'   \/><label for='answer-id-1165846' id='answer-label-1165846' class=' answer'><span>Assign an 1AM policy to the instance profile to allow the EC2 instances to be managed by AWS Systems Manager Provide the 1AM user accounts with permission to use Systems Manager Remove the SSH keys from the EC2 instances Use Systems Manager Inventory to select the EC2 instance and connect<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297107[]' id='answer-id-1165847' class='answer   answerof-297107 ' value='1165847'   \/><label for='answer-id-1165847' id='answer-label-1165847' class=' answer'><span>Assign an 1AM policy to the 1AM user accounts to provide permission to use AWS Systems Manager Run Command Remove the SSH keys from the EC2 instances Use Run Command to open an SSH connection to the EC2 instance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297107[]' id='answer-id-1165848' class='answer   answerof-297107 ' value='1165848'   \/><label for='answer-id-1165848' id='answer-label-1165848' class=' answer'><span>Assign an 1AM policy to the instance profile to allow the EC2 instances to be managed by AWS Systems Manager Provide the 1AM user accounts with permission to use Systems Manager Remove the SSH keys from the EC2 instances Use Systems Manager Session Manager to select the EC2 instance and connect<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297107[]' id='answer-id-1165849' class='answer   answerof-297107 ' value='1165849'   \/><label for='answer-id-1165849' id='answer-label-1165849' class=' answer'><span>Assign an 1AM policy to the 1AM user accounts to provide permission to use the EC2 service in the AWS Management Console Remove the SSH keys from the EC2 instances Connect to the EC2 instance as the ec2-user through the AWS Management Console's EC2 SSH client method<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-87' style=';'><div id='questionWrap-87'  class='   watupro-question-id-297108'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>87. <\/span>A security engineer is using AWS Organizations and wants to optimize SCPs. The security engineer needs to ensure that the SCPs conform to best practices. <br \/>\r<br>Which approach should the security engineer take to meet this requirement?<\/div><input type='hidden' name='question_id[]' id='qID_87' value='297108' \/><input type='hidden' id='answerType297108' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297108[]' id='answer-id-1165850' class='answer   answerof-297108 ' value='1165850'   \/><label for='answer-id-1165850' id='answer-label-1165850' class=' answer'><span>Use AWS IAM Access Analyzer to analyze the policies. View the findings from policy validation checks.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297108[]' id='answer-id-1165851' class='answer   answerof-297108 ' value='1165851'   \/><label for='answer-id-1165851' id='answer-label-1165851' class=' answer'><span>Review AWS Trusted Advisor checks for all accounts in the organization.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297108[]' id='answer-id-1165852' class='answer   answerof-297108 ' value='1165852'   \/><label for='answer-id-1165852' id='answer-label-1165852' class=' answer'><span>Set up AWS Audit Manager. Run an assessment for all AWS Regions for all accounts.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297108[]' id='answer-id-1165853' class='answer   answerof-297108 ' value='1165853'   \/><label for='answer-id-1165853' id='answer-label-1165853' class=' answer'><span>Ensure that Amazon Inspector agents are installed on all Amazon EC2 in-stances in all accounts.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-88' style=';'><div id='questionWrap-88'  class='   watupro-question-id-297109'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>88. <\/span>A company's security engineer has been tasked with restricting a contractor's IAM account access to the company's Amazon EC2 console without providing access to any other IAM services The contractors IAM account must not be able to gain access to any other IAM service, even it the IAM account rs assigned additional permissions based on IAM group membership <br \/>\r<br>What should the security engineer do to meet these requirements''<\/div><input type='hidden' name='question_id[]' id='qID_88' value='297109' \/><input type='hidden' id='answerType297109' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297109[]' id='answer-id-1165854' class='answer   answerof-297109 ' value='1165854'   \/><label for='answer-id-1165854' id='answer-label-1165854' class=' answer'><span>Create an mime IAM user policy that allows for Amazon EC2 access for the contractor's IAM user<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297109[]' id='answer-id-1165855' class='answer   answerof-297109 ' value='1165855'   \/><label for='answer-id-1165855' id='answer-label-1165855' class=' answer'><span>Create an IAM permissions boundary policy that allows Amazon EC2 access Associate the contractor's IAM account with the IAM permissions boundary policy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297109[]' id='answer-id-1165856' class='answer   answerof-297109 ' value='1165856'   \/><label for='answer-id-1165856' id='answer-label-1165856' class=' answer'><span>Create an IAM group with an attached policy that allows for Amazon EC2 access Associate the contractor's IAM account with the IAM group<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297109[]' id='answer-id-1165857' class='answer   answerof-297109 ' value='1165857'   \/><label for='answer-id-1165857' id='answer-label-1165857' class=' answer'><span>Create a IAM role that allows for EC2 and explicitly denies all other services Instruct the contractor to always assume this role<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-89' style=';'><div id='questionWrap-89'  class='   watupro-question-id-297110'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>89. <\/span>A company is using AWS Organizations to manage multiple accounts. The company needs to allow an IAM user to use a role to access resources that are in another organization's AWS account. <br \/>\r<br>Which combination of steps must the company perform to meet this requirement? (Select TWO.)<\/div><input type='hidden' name='question_id[]' id='qID_89' value='297110' \/><input type='hidden' id='answerType297110' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297110[]' id='answer-id-1165858' class='answer   answerof-297110 ' value='1165858'   \/><label for='answer-id-1165858' id='answer-label-1165858' class=' answer'><span>Create an identity policy that allows the sts: AssumeRole action in the AWS account that contains the resources. Attach the identity policy to the IAM user.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297110[]' id='answer-id-1165859' class='answer   answerof-297110 ' value='1165859'   \/><label for='answer-id-1165859' id='answer-label-1165859' class=' answer'><span>Ensure that the sts: AssumeRole action is allowed by the SCPs of the organization that owns the resources that the IAM user needs to access.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297110[]' id='answer-id-1165860' class='answer   answerof-297110 ' value='1165860'   \/><label for='answer-id-1165860' id='answer-label-1165860' class=' answer'><span>Create a role in the AWS account that contains the resources. Create an entry in the role's trust policy that allows the IAM user to assume the role. Attach the trust policy to the role.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297110[]' id='answer-id-1165861' class='answer   answerof-297110 ' value='1165861'   \/><label for='answer-id-1165861' id='answer-label-1165861' class=' answer'><span>Establish a trust relationship between the IAM user and the AWS account that contains the resources.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297110[]' id='answer-id-1165862' class='answer   answerof-297110 ' value='1165862'   \/><label for='answer-id-1165862' id='answer-label-1165862' class=' answer'><span>Create a role in the IAM user's AWS account. Create an identity policy that allows the sts: AssumeRole action. Attach the identity policy to the role.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-90' style=';'><div id='questionWrap-90'  class='   watupro-question-id-297111'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>90. <\/span>A company's AWS CloudTrail logs are all centrally stored in an Amazon S3 bucket. The security team controls the company's AWS account. The security team must prevent unauthorized access and tampering of the CloudTrail logs. <br \/>\r<br>Which combination of steps should the security team take? (Choose three.)<\/div><input type='hidden' name='question_id[]' id='qID_90' value='297111' \/><input type='hidden' id='answerType297111' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297111[]' id='answer-id-1165863' class='answer   answerof-297111 ' value='1165863'   \/><label for='answer-id-1165863' id='answer-label-1165863' class=' answer'><span>Configure server-side encryption with AWS KMS managed encryption keys (SSE-KMS)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297111[]' id='answer-id-1165864' class='answer   answerof-297111 ' value='1165864'   \/><label for='answer-id-1165864' id='answer-label-1165864' class=' answer'><span>Compress log file with secure gzip.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297111[]' id='answer-id-1165865' class='answer   answerof-297111 ' value='1165865'   \/><label for='answer-id-1165865' id='answer-label-1165865' class=' answer'><span>Create an Amazon EventBridge (Amazon CloudWatch Events) rule to notify the security team of any modifications on CloudTrail log files.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297111[]' id='answer-id-1165866' class='answer   answerof-297111 ' value='1165866'   \/><label for='answer-id-1165866' id='answer-label-1165866' class=' answer'><span>Implement least privilege access to the S3 bucket by configuring a bucket policy.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297111[]' id='answer-id-1165867' class='answer   answerof-297111 ' value='1165867'   \/><label for='answer-id-1165867' id='answer-label-1165867' class=' answer'><span>Configure CloudTrail log file integrity validation.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297111[]' id='answer-id-1165868' class='answer   answerof-297111 ' value='1165868'   \/><label for='answer-id-1165868' id='answer-label-1165868' class=' answer'><span>Configure Access Analyzer for S3.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-91' style=';'><div id='questionWrap-91'  class='   watupro-question-id-297112'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>91. <\/span>A company stores sensitive documents in Amazon S3 by using server-side encryption with an IAM Key Management Service (IAM KMS) CMK. A new requirement mandates that the CMK that is used for these documents can be used only for S3 actions. <br \/>\r<br>Which statement should the company add to the key policy to meet this requirement? <br \/>\r<br>A) <br \/>\r<br><br><img decoding=\"async\" width=369 height=192 id=\"\u56fe\u7247 38\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image027-20.jpg\"><br><br \/>\r<br>B) <br \/>\r<br><br><img decoding=\"async\" width=360 height=191 id=\"\u56fe\u7247 37\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image028-20.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_91' value='297112' \/><input type='hidden' id='answerType297112' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297112[]' id='answer-id-1165869' class='answer   answerof-297112 ' value='1165869'   \/><label for='answer-id-1165869' id='answer-label-1165869' class=' answer'><span>Option A<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297112[]' id='answer-id-1165870' class='answer   answerof-297112 ' value='1165870'   \/><label for='answer-id-1165870' id='answer-label-1165870' class=' answer'><span>Option B<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-92' style=';'><div id='questionWrap-92'  class='   watupro-question-id-297113'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>92. <\/span>A Security Engineer receives alerts that an Amazon EC2 instance on a public subnet is under an SFTP brute force attack from a specific IP address, which is a known malicious bot. <br \/>\r<br>What should the Security Engineer do to block the malicious bot?<\/div><input type='hidden' name='question_id[]' id='qID_92' value='297113' \/><input type='hidden' id='answerType297113' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297113[]' id='answer-id-1165871' class='answer   answerof-297113 ' value='1165871'   \/><label for='answer-id-1165871' id='answer-label-1165871' class=' answer'><span>Add a deny rule to the public VPC security group to block the malicious IP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297113[]' id='answer-id-1165872' class='answer   answerof-297113 ' value='1165872'   \/><label for='answer-id-1165872' id='answer-label-1165872' class=' answer'><span>Add the malicious IP to IAM WAF backhsted IPs<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297113[]' id='answer-id-1165873' class='answer   answerof-297113 ' value='1165873'   \/><label for='answer-id-1165873' id='answer-label-1165873' class=' answer'><span>Configure Linux iptables or Windows Firewall to block any traffic from the malicious IP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297113[]' id='answer-id-1165874' class='answer   answerof-297113 ' value='1165874'   \/><label for='answer-id-1165874' id='answer-label-1165874' class=' answer'><span>Modify the hosted zone in Amazon Route 53 and create a DNS sinkhole for the malicious IP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-93' style=';'><div id='questionWrap-93'  class='   watupro-question-id-297114'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>93. <\/span>A systems engineer deployed containers from several custom-built images that an application team provided through a QA workflow The systems engineer used Amazon Elastic Container Service (Amazon ECS) with the Fargate launch type as the target platform The system engineer now needs to collect logs from all containers into an existing Amazon CloudWatch log group <br \/>\r<br>Which solution will meet this requirement?<\/div><input type='hidden' name='question_id[]' id='qID_93' value='297114' \/><input type='hidden' id='answerType297114' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297114[]' id='answer-id-1165875' class='answer   answerof-297114 ' value='1165875'   \/><label for='answer-id-1165875' id='answer-label-1165875' class=' answer'><span>Turn on the awslogs log driver by specifying parameters for awslogs-group and awslogs-region m the LogConfiguration property<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297114[]' id='answer-id-1165876' class='answer   answerof-297114 ' value='1165876'   \/><label for='answer-id-1165876' id='answer-label-1165876' class=' answer'><span>Download and configure the CloudWatch agent on the container instances<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297114[]' id='answer-id-1165877' class='answer   answerof-297114 ' value='1165877'   \/><label for='answer-id-1165877' id='answer-label-1165877' class=' answer'><span>Set up Fluent Bit and FluentO as a DaemonSet to send logs to Amazon CloudWatch Logs<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297114[]' id='answer-id-1165878' class='answer   answerof-297114 ' value='1165878'   \/><label for='answer-id-1165878' id='answer-label-1165878' class=' answer'><span>Configure an 1AM policy that includes the togs CreateLogGroup action Assign the policy to the container instances<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-94' style=';'><div id='questionWrap-94'  class='   watupro-question-id-297115'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>94. <\/span>A recent security audit found that IAM CloudTrail logs are insufficiently protected from tampering and unauthorized access <br \/>\r<br>Which actions must the Security Engineer take to address these audit findings? (Select THREE)<\/div><input type='hidden' name='question_id[]' id='qID_94' value='297115' \/><input type='hidden' id='answerType297115' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297115[]' id='answer-id-1165879' class='answer   answerof-297115 ' value='1165879'   \/><label for='answer-id-1165879' id='answer-label-1165879' class=' answer'><span>Ensure CloudTrail log file validation is turned on<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297115[]' id='answer-id-1165880' class='answer   answerof-297115 ' value='1165880'   \/><label for='answer-id-1165880' id='answer-label-1165880' class=' answer'><span>Configure an S3 lifecycle rule to periodically archive CloudTrail logs into Glacier for long-term storage<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297115[]' id='answer-id-1165881' class='answer   answerof-297115 ' value='1165881'   \/><label for='answer-id-1165881' id='answer-label-1165881' class=' answer'><span>Use an S3 bucket with tight access controls that exists m a separate account<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297115[]' id='answer-id-1165882' class='answer   answerof-297115 ' value='1165882'   \/><label for='answer-id-1165882' id='answer-label-1165882' class=' answer'><span>Use Amazon Inspector to monitor the file integrity of CloudTrail log files.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297115[]' id='answer-id-1165883' class='answer   answerof-297115 ' value='1165883'   \/><label for='answer-id-1165883' id='answer-label-1165883' class=' answer'><span>Request a certificate through ACM and use a generated certificate private key to encrypt CloudTrail log files<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297115[]' id='answer-id-1165884' class='answer   answerof-297115 ' value='1165884'   \/><label for='answer-id-1165884' id='answer-label-1165884' class=' answer'><span>Encrypt the CloudTrail log files with server-side encryption with IAM KMS-managed keys (SSE-KMS)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-95' style=';'><div id='questionWrap-95'  class='   watupro-question-id-297116'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>95. <\/span>Auditors for a health care company have mandated that all data volumes be encrypted at rest Infrastructure is deployed mainly via IAM CloudFormation however third-party frameworks and manual deployment are required on some legacy systems <br \/>\r<br>What is the BEST way to monitor, on a recurring basis, whether all EBS volumes are encrypted?<\/div><input type='hidden' name='question_id[]' id='qID_95' value='297116' \/><input type='hidden' id='answerType297116' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297116[]' id='answer-id-1165885' class='answer   answerof-297116 ' value='1165885'   \/><label for='answer-id-1165885' id='answer-label-1165885' class=' answer'><span>On a recurring basis, update an IAM user policies to require that EC2 instances are created with an encrypted volume<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297116[]' id='answer-id-1165886' class='answer   answerof-297116 ' value='1165886'   \/><label for='answer-id-1165886' id='answer-label-1165886' class=' answer'><span>Configure an IAM Config rule lo run on a recurring basis 'or volume encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297116[]' id='answer-id-1165887' class='answer   answerof-297116 ' value='1165887'   \/><label for='answer-id-1165887' id='answer-label-1165887' class=' answer'><span>Set up Amazon Inspector rules tor volume encryption to run on a recurring schedule<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297116[]' id='answer-id-1165888' class='answer   answerof-297116 ' value='1165888'   \/><label for='answer-id-1165888' id='answer-label-1165888' class=' answer'><span>Use CloudWatch Logs to determine whether instances were created with an encrypted volume<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-96' style=';'><div id='questionWrap-96'  class='   watupro-question-id-297117'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>96. <\/span>A startup company is using a single AWS account that has resources in a single AWS Region. A security engineer configures an AWS Cloud Trail trail in the same Region to deliver log files to an Amazon S3 bucket by using the AWS CLI. <br \/>\r<br>Because of expansion, the company adds resources in multiple Regions. The security engineer notices that the logs from the new Regions are not reaching the S3 bucket. <br \/>\r<br>What should the security engineer do to fix this issue with the LEAST amount of operational overhead?<\/div><input type='hidden' name='question_id[]' id='qID_96' value='297117' \/><input type='hidden' id='answerType297117' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297117[]' id='answer-id-1165889' class='answer   answerof-297117 ' value='1165889'   \/><label for='answer-id-1165889' id='answer-label-1165889' class=' answer'><span>Create a new CloudTrail trail. Select the new Regions where the company added resources.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297117[]' id='answer-id-1165890' class='answer   answerof-297117 ' value='1165890'   \/><label for='answer-id-1165890' id='answer-label-1165890' class=' answer'><span>Change the S3 bucket to receive notifications to track all actions from all Regions.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297117[]' id='answer-id-1165891' class='answer   answerof-297117 ' value='1165891'   \/><label for='answer-id-1165891' id='answer-label-1165891' class=' answer'><span>Create a new CloudTrail trail that applies to all Regions.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297117[]' id='answer-id-1165892' class='answer   answerof-297117 ' value='1165892'   \/><label for='answer-id-1165892' id='answer-label-1165892' class=' answer'><span>Change the existing CloudTrail trail so that it applies to all Regions.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-97' style=';'><div id='questionWrap-97'  class='   watupro-question-id-297118'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>97. <\/span>A company's cloud operations team is responsible for building effective security for IAM cross-account access. The team asks a security engineer to help troubleshoot why some developers in the developer account (123456789012) in the developers group are not able to assume a cross-account role (ReadS3) into a production account (999999999999) to read the contents of an Amazon S3 bucket (productionapp). The two account policies are as follows: <br \/>\r<br><br><img decoding=\"async\" width=497 height=825 id=\"\u56fe\u7247 36\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2023\/11\/image029-20.jpg\"><br><br \/>\r<br>Which recommendations should the security engineer make to resolve this issue? (Select TWO.)<\/div><input type='hidden' name='question_id[]' id='qID_97' value='297118' \/><input type='hidden' id='answerType297118' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297118[]' id='answer-id-1165893' class='answer   answerof-297118 ' value='1165893'   \/><label for='answer-id-1165893' id='answer-label-1165893' class=' answer'><span>Ask the developers to change their password and use a different web browser.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297118[]' id='answer-id-1165894' class='answer   answerof-297118 ' value='1165894'   \/><label for='answer-id-1165894' id='answer-label-1165894' class=' answer'><span>Ensure that developers are using multi-factor authentication (MFA) when they log in to their developer account as the developer role.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297118[]' id='answer-id-1165895' class='answer   answerof-297118 ' value='1165895'   \/><label for='answer-id-1165895' id='answer-label-1165895' class=' answer'><span>Modify the production account ReadS3 role policy to allow the PutBucketPolicy action on the productionapp S3 bucket.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297118[]' id='answer-id-1165896' class='answer   answerof-297118 ' value='1165896'   \/><label for='answer-id-1165896' id='answer-label-1165896' class=' answer'><span>Update the trust relationship policy on the production account S3 role to allow the account number of the developer account.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297118[]' id='answer-id-1165897' class='answer   answerof-297118 ' value='1165897'   \/><label for='answer-id-1165897' id='answer-label-1165897' class=' answer'><span>Update the developer group permissions in the developer account to allow access to the productionapp S3 bucket.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-98' style=';'><div id='questionWrap-98'  class='   watupro-question-id-297119'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>98. <\/span>A company deploys a distributed web application on a fleet of Amazon EC2 instances. The fleet is behind an Application Load Balancer (ALB) that will be configured to terminate the TLS connection. All TLS traffic to the ALB must stay secure, even if the certificate private key is compromised. <br \/>\r<br>How can a security engineer meet this requirement?<\/div><input type='hidden' name='question_id[]' id='qID_98' value='297119' \/><input type='hidden' id='answerType297119' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297119[]' id='answer-id-1165898' class='answer   answerof-297119 ' value='1165898'   \/><label for='answer-id-1165898' id='answer-label-1165898' class=' answer'><span>Create an HTTPS listener that uses a certificate that is managed by IAM Certificate Manager (ACM).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297119[]' id='answer-id-1165899' class='answer   answerof-297119 ' value='1165899'   \/><label for='answer-id-1165899' id='answer-label-1165899' class=' answer'><span>Create an HTTPS listener that uses a security policy that uses a cipher suite with perfect toward secrecy (PFS).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297119[]' id='answer-id-1165900' class='answer   answerof-297119 ' value='1165900'   \/><label for='answer-id-1165900' id='answer-label-1165900' class=' answer'><span>Create an HTTPS listener that uses the Server Order Preference security feature.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-297119[]' id='answer-id-1165901' class='answer   answerof-297119 ' value='1165901'   \/><label for='answer-id-1165901' id='answer-label-1165901' class=' answer'><span>Create a TCP listener that uses a custom security policy that allows only cipher suites with perfect forward secrecy (PFS).<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-99' style=';'><div id='questionWrap-99'  class='   watupro-question-id-297120'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>99. <\/span>A company\u2019s public Application Load Balancer (ALB) recently experienced a DDoS attack. To mitigate this issue. the company deployed Amazon CloudFront in front of the ALB so that users would not directly access the Amazon EC2 instances behind the ALB. <br \/>\r<br>The company discovers that some traffic is still coming directly into the ALB and is still being handled by the EC2 instances. <br \/>\r<br>Which combination of steps should the company take to ensure that the EC2 instances will receive traffic only from CloudFront? (Choose two.)<\/div><input type='hidden' name='question_id[]' id='qID_99' value='297120' \/><input type='hidden' id='answerType297120' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297120[]' id='answer-id-1165902' class='answer   answerof-297120 ' value='1165902'   \/><label for='answer-id-1165902' id='answer-label-1165902' class=' answer'><span>Configure CloudFront to add a cache key policy to allow a custom HTTP header that CloudFront sends to the AL<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297120[]' id='answer-id-1165903' class='answer   answerof-297120 ' value='1165903'   \/><label for='answer-id-1165903' id='answer-label-1165903' class=' answer'><span>Configure CloudFront to add a custom: HTTP header to requests that CloudFront sends to the AL<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297120[]' id='answer-id-1165904' class='answer   answerof-297120 ' value='1165904'   \/><label for='answer-id-1165904' id='answer-label-1165904' class=' answer'><span>Configure the ALB to forward only requests that contain the custom HTTP header.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297120[]' id='answer-id-1165905' class='answer   answerof-297120 ' value='1165905'   \/><label for='answer-id-1165905' id='answer-label-1165905' class=' answer'><span>Configure the ALB and CloudFront to use the X-Forwarded-For header to check client IP addresses.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297120[]' id='answer-id-1165906' class='answer   answerof-297120 ' value='1165906'   \/><label for='answer-id-1165906' id='answer-label-1165906' class=' answer'><span>Configure the ALB and CloudFront to use the same<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297120[]' id='answer-id-1165907' class='answer   answerof-297120 ' value='1165907'   \/><label for='answer-id-1165907' id='answer-label-1165907' class=' answer'><span>509 certificate that is generated by AWS Certificate Manager (ACM).<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-100' style=';'><div id='questionWrap-100'  class='   watupro-question-id-297121'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>100. <\/span>A company h as a legacy application that runs on a single Amazon E C2 instance. A security audit shows that the application has been using an IAM access key within its code to access an Amazon S3 bucket that is named DOC-EXAMPLE-BUCKET1 in the same AWS account. This access key pair has the s3:GetObject permission to all objects in only this S3 bucket. The company takes the application offline because the application is not compliant with the company\u2019s security policies for accessing other AWS resources from Amazon EC2. <br \/>\r<br>A security engineer validates that AWS CloudTrail is turned on in all AWS Regions. CloudTrail is sending logs to an S3 bucket that is named DOC-EXAMPLE-BUCKET2. This S3 bucket is in the same AWS account as DOC-EXAMPLE-BUCKET1. However, CloudTrail has not been configured to send logs to Amazon CloudWatch Logs. <br \/>\r<br>The company wants to know if any objects in DOC-EXAMPLE-BUCKET1 were accessed with the IAM access key in the past 60 days. If any objects were accessed, the company wants to know if any of the objects that are text files (.txt extension) contained personally identifiable information (PII). <br \/>\r<br>Which combination of steps should the security engineer take to gather this information? (Choose two.)<\/div><input type='hidden' name='question_id[]' id='qID_100' value='297121' \/><input type='hidden' id='answerType297121' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297121[]' id='answer-id-1165908' class='answer   answerof-297121 ' value='1165908'   \/><label for='answer-id-1165908' id='answer-label-1165908' class=' answer'><span>Configure Amazon Macie to identify any objects in DOC-EXAMPLE-BUCKET1 that contain PII and that were available to the access key.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297121[]' id='answer-id-1165909' class='answer   answerof-297121 ' value='1165909'   \/><label for='answer-id-1165909' id='answer-label-1165909' class=' answer'><span>Use Amazon CloudWatch Logs Insights to identify any objects in DOC-EXAMPLE-BUCKET1 that contain PII and that were available to the access key.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297121[]' id='answer-id-1165910' class='answer   answerof-297121 ' value='1165910'   \/><label for='answer-id-1165910' id='answer-label-1165910' class=' answer'><span>Use Amazon OpenSearch Service (Amazon Elasticsearch Service) to query the CloudTrail logs in DOC-EXAMPLE-BUCKET2 for API calls that used the access key to access an object that contained PI<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297121[]' id='answer-id-1165911' class='answer   answerof-297121 ' value='1165911'   \/><label for='answer-id-1165911' id='answer-label-1165911' class=' answer'><span>Use Amazon Athena to query the CloudTrail logs in DOC-EXAMPLE-BUCKET2 for any API calls that used the access key to access an object that contained PI<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-297121[]' id='answer-id-1165912' class='answer   answerof-297121 ' value='1165912'   \/><label for='answer-id-1165912' id='answer-label-1165912' class=' answer'><span>Use AWS Identity and Access Management Access Analyzer to identify any API calls that used the access key to access objects that contained PII in DOC-EXAMPLE-BUCKET1.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div style='display:none' id='question-101'>\n\t<div class='question-content'>\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading...\" title=\"Loading...\" \/>&nbsp;Loading...\t<\/div>\n<\/div>\n\n<br \/>\n\t\n\t\t\t<div class=\"watupro_buttons flex \" id=\"watuPROButtons7938\" >\n\t\t  <div id=\"prev-question\" style=\"display:none;\"><input type=\"button\" value=\"&lt; Previous\" onclick=\"WatuPRO.nextQuestion(event, 'previous');\"\/><\/div>\t\t  \t\t  \t\t   \n\t\t   \t  \t\t<div><input type=\"button\" name=\"action\" class=\"watupro-submit-button\" onclick=\"WatuPRO.submitResult(event)\" id=\"action-button\" value=\"View Results\"  \/>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t<input type=\"hidden\" name=\"quiz_id\" value=\"7938\" id=\"watuPROExamID\"\/>\n\t<input type=\"hidden\" name=\"start_time\" id=\"startTime\" value=\"2026-05-11 15:12:14\" \/>\n\t<input type=\"hidden\" name=\"start_timestamp\" id=\"startTimeStamp\" value=\"1778512334\" \/>\n\t<input type=\"hidden\" name=\"question_ids\" value=\"\" \/>\n\t<input type=\"hidden\" name=\"watupro_questions\" value=\"297022:1165468,1165469,1165470,1165471,1165472 | 297023:1165473,1165474,1165475,1165476 | 297024:1165477,1165478,1165479,1165480,1165481 | 297025:1165482,1165483,1165484,1165485,1165486 | 297026:1165487,1165488,1165489,1165490,1165491 | 297027:1165492,1165493,1165494,1165495 | 297028:1165496,1165497,1165498,1165499 | 297029:1165500,1165501,1165502,1165503 | 297030:1165504,1165505,1165506,1165507,1165508,1165509 | 297031:1165510,1165511,1165512,1165513 | 297032:1165514,1165515,1165516,1165517,1165518 | 297033:1165519,1165520,1165521,1165522,1165523 | 297034:1165524 | 297035:1165525,1165526,1165527,1165528 | 297036:1165529,1165530,1165531,1165532 | 297037:1165533,1165534,1165535,1165536,1165537 | 297038:1165538,1165539,1165540,1165541 | 297039:1165542,1165543,1165544,1165545 | 297040:1165546,1165547,1165548,1165549,1165550 | 297041:1165551,1165552,1165553,1165554 | 297042:1165555,1165556,1165557,1165558,1165559 | 297043:1165560,1165561,1165562,1165563 | 297044:1165564,1165565,1165566,1165567,1165568 | 297045:1165569,1165570,1165571,1165572 | 297046:1165573,1165574,1165575,1165576 | 297047:1165577,1165578,1165579,1165580,1165581 | 297048:1165582,1165583,1165584,1165585 | 297049:1165586,1165587,1165588,1165589 | 297050:1165590,1165591,1165592,1165593 | 297051:1165594,1165595,1165596,1165597 | 297052:1165598,1165599,1165600,1165601,1165602 | 297053:1165603,1165604,1165605,1165606,1165607,1165608 | 297054:1165609,1165610,1165611,1165612 | 297055:1165613,1165614,1165615,1165616 | 297056:1165617,1165618,1165619,1165620,1165621 | 297057:1165622,1165623,1165624,1165625,1165626 | 297058:1165627,1165628,1165629,1165630 | 297059:1165631,1165632,1165633,1165634,1165635 | 297060:1165636,1165637,1165638,1165639 | 297061:1165640,1165641,1165642,1165643,1165644,1165645 | 297062:1165646,1165647,1165648,1165649,1165650 | 297063:1165651,1165652,1165653,1165654 | 297064:1165655,1165656,1165657,1165658 | 297065:1165659,1165660,1165661,1165662 | 297066:1165663,1165664,1165665,1165666 | 297067:1165667,1165668,1165669,1165670,1165671 | 297068:1165672,1165673,1165674,1165675 | 297069:1165676,1165677,1165678,1165679,1165680 | 297070:1165681,1165682,1165683,1165684 | 297071:1165685,1165686,1165687,1165688 | 297072:1165689,1165690,1165691,1165692 | 297073:1165693,1165694,1165695,1165696,1165697 | 297074:1165698,1165699,1165700,1165701 | 297075:1165702,1165703,1165704,1165705,1165706 | 297076:1165707,1165708,1165709,1165710,1165711,1165712 | 297077:1165713,1165714,1165715,1165716 | 297078:1165717,1165718,1165719,1165720 | 297079:1165721,1165722,1165723,1165724,1165725 | 297080:1165726,1165727,1165728,1165729,1165730,1165731,1165732 | 297081:1165733,1165734,1165735,1165736 | 297082:1165737,1165738,1165739,1165740,1165741,1165742 | 297083:1165743,1165744,1165745,1165746 | 297084:1165747,1165748,1165749,1165750,1165751 | 297085:1165752,1165753,1165754,1165755 | 297086:1165756,1165757,1165758,1165759,1165760 | 297087:1165761,1165762,1165763,1165764,1165765 | 297088:1165766,1165767,1165768,1165769 | 297089:1165770,1165771,1165772,1165773 | 297090:1165774,1165775,1165776,1165777,1165778,1165779 | 297091:1165780,1165781,1165782,1165783 | 297092:1165784,1165785,1165786,1165787 | 297093:1165788 | 297094:1165789,1165790,1165791,1165792 | 297095:1165793,1165794,1165795,1165796,1165797 | 297096:1165798,1165799,1165800,1165801 | 297097:1165802,1165803,1165804,1165805 | 297098:1165806,1165807,1165808,1165809 | 297099:1165810,1165811,1165812,1165813,1165814,1165815 | 297100:1165816,1165817,1165818,1165819 | 297101:1165820,1165821,1165822,1165823 | 297102:1165824,1165825,1165826,1165827 | 297103:1165828,1165829,1165830,1165831,1165832 | 297104:1165833,1165834,1165835,1165836 | 297105:1165837,1165838,1165839,1165840 | 297106:1165841,1165842,1165843,1165844,1165845 | 297107:1165846,1165847,1165848,1165849 | 297108:1165850,1165851,1165852,1165853 | 297109:1165854,1165855,1165856,1165857 | 297110:1165858,1165859,1165860,1165861,1165862 | 297111:1165863,1165864,1165865,1165866,1165867,1165868 | 297112:1165869,1165870 | 297113:1165871,1165872,1165873,1165874 | 297114:1165875,1165876,1165877,1165878 | 297115:1165879,1165880,1165881,1165882,1165883,1165884 | 297116:1165885,1165886,1165887,1165888 | 297117:1165889,1165890,1165891,1165892 | 297118:1165893,1165894,1165895,1165896,1165897 | 297119:1165898,1165899,1165900,1165901 | 297120:1165902,1165903,1165904,1165905,1165906,1165907 | 297121:1165908,1165909,1165910,1165911,1165912\" \/>\n\t<input type=\"hidden\" name=\"no_ajax\" value=\"0\">\t\t\t<\/form>\n\t<p>&nbsp;<\/p>\n<\/div>\n\n<script type=\"text\/javascript\">\n\/\/jQuery(document).ready(function(){\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \t\nvar question_ids = \"297022,297023,297024,297025,297026,297027,297028,297029,297030,297031,297032,297033,297034,297035,297036,297037,297038,297039,297040,297041,297042,297043,297044,297045,297046,297047,297048,297049,297050,297051,297052,297053,297054,297055,297056,297057,297058,297059,297060,297061,297062,297063,297064,297065,297066,297067,297068,297069,297070,297071,297072,297073,297074,297075,297076,297077,297078,297079,297080,297081,297082,297083,297084,297085,297086,297087,297088,297089,297090,297091,297092,297093,297094,297095,297096,297097,297098,297099,297100,297101,297102,297103,297104,297105,297106,297107,297108,297109,297110,297111,297112,297113,297114,297115,297116,297117,297118,297119,297120,297121\";\nWatuPROSettings[7938] = {};\nWatuPRO.qArr = question_ids.split(',');\nWatuPRO.exam_id = 7938;\t    \nWatuPRO.post_id = 68166;\nWatuPRO.store_progress = 0;\nWatuPRO.curCatPage = 1;\nWatuPRO.requiredIDs=\"0\".split(\",\");\nWatuPRO.hAppID = \"0.09450500 1778512334\";\nvar url = \"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/show_exam.php\";\nWatuPRO.examMode = 1;\nWatuPRO.siteURL=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-admin\/admin-ajax.php\";\nWatuPRO.emailIsNotRequired = 0;\nWatuPROIntel.init(7938);\nWatuPRO.inCategoryPages=1;});    \t \n<\/script>\n\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[175],"tags":[16469],"class_list":["post-68166","post","type-post","status-publish","format-standard","hentry","category-amazon","tag-scs-c02-dumps-updated"],"_links":{"self":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/68166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/comments?post=68166"}],"version-history":[{"count":1,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/68166\/revisions"}],"predecessor-version":[{"id":68169,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/68166\/revisions\/68169"}],"wp:attachment":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/media?parent=68166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/categories?post=68166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/tags?post=68166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}