Free AWS-Certified-Security-Specialty Exam Braindumps

Pass your Amazon AWS Certified Security - Specialty exam with these free Questions and Answers

Page 16 of 118
QUESTION 71

- (Exam Topic 1)
A Developer reported that AWS CloudTrail was disabled on their account. A Security Engineer investigated the account and discovered the event was undetected by the current security solution. The Security Engineer must recommend a solution that will detect future changes to the CloudTrail configuration and send alerts when changes occur.
What should the Security Engineer do to meet these requirements?

  1. A. Use AWS Resource Access Manager (AWS RAM) to monitor the AWS CloudTrail configuratio
  2. B. Send notifications using Amazon SNS.
  3. C. Create an Amazon CloudWatch Events rule to monitor Amazon GuardDuty finding
  4. D. Send email notifications using Amazon SNS.
  5. E. Update security contact details in AWS account settings for AWS Support to send alerts when suspicious activity is detected.
  6. F. Use Amazon Inspector to automatically detect security issue
  7. G. Send alerts using Amazon SNS.

Correct Answer: B

QUESTION 72

- (Exam Topic 3)
A company's Security Engineer is copying all application logs to centralized Amazon S3 buckets. Currently, each of the company's applications is in its own AWS account, and logs are pushed into S3 buckets associated with each account. The Engineer will deploy an AWS Lambda function into each account that copies the relevant log files to the centralized S3 bucket.
The Security Engineer is unable to access the log files in the centralized S3 bucket. The Engineer's IAM user policy from the centralized account looks like this:
AWS-Certified-Security-Specialty dumps exhibit
The centralized S3 bucket policy looks like this:
AWS-Certified-Security-Specialty dumps exhibit
Why is the Security Engineer unable to access the log files?

  1. A. The S3 bucket policy does not explicitly allow the Security Engineer access to the objects in the bucket.
  2. B. The object ACLs are not being updated to allow the users within the centralized account to access the objects
  3. C. The Security Engineers IAM policy does not grant permissions to read objects in the S3 bucket
  4. D. The s3:PutObject and s3:PutObjectAcl permissions should be applied at the S3 bucket level

Correct Answer: C

QUESTION 73

- (Exam Topic 3)
A company stores critical data in an S3 bucket. There is a requirement to ensure that an extra level of security is added to the S3 bucket. In addition , it should be ensured that objects are available in a secondary region if the primary one goes down. Which of the following can help fulfil these requirements? Choose 2 answers from the options given below
Please select:

  1. A. Enable bucket versioning and also enable CRR
  2. B. Enable bucket versioning and enable Master Pays
  3. C. For the Bucket policy add a condition for {"Null": {"aws:MultiFactorAuthAge": true}} i
  4. D. Enable the Bucket ACL and add a condition for {"Null": {"aws:MultiFactorAuthAge": true}}

Correct Answer: AC
The AWS Documentation mentions the following Adding a Bucket Policy to Require MFA
Amazon S3 supports MFA-protected API access, a feature that can enforce multi-factor authentication (MFA) for access to your Amazon S3 resources. Multi-factor authentication provides an extra level of security you can apply to your AWS environment. It is a security feature that requires users to prove physical possession of an MFA device by providing a valid MFA code. For more information, go to AWS Multi-Factor Authentication. You can require MFA authentication for any requests to access your Amazoi. S3 resources.
You can enforce the MFA authentication requirement using the aws:MultiFactorAuthAge key in a bucket policy. IAM users car access Amazon S3 resources by using temporary credentials issued by the AWS Security Token Service (STS). You provide the MFA code at the time of the STS request.
When Amazon S3 receives a request with MFA authentication, the aws:MultiFactorAuthAge key provides a numeric value indicating how long ago (in seconds) the temporary credential was created. If the temporary credential provided in the request was not created using an MFA device, this key value is null (absent). In a bucket policy, you can add a condition to check this value, as shown in the following example bucket policy. The policy denies any Amazon S3 operation on the /taxdocuments folder in the examplebucket bucket if the request is not MFA authenticated. To learn more about MFA authentication, see Using Multi-Factor Authentication (MFA) in AWS in the IAM User Guide.
AWS-Certified-Security-Specialty dumps exhibit
C:\Users\wk\Desktop\mudassar\Untitled.jpg
Option B is invalid because just enabling bucket versioning will not guarantee replication of objects Option D is invalid because the condition for the bucket policy needs to be set accordingly For more information on example bucket policies, please visit the following URL: • https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html
Also versioning and Cross Region replication can ensure that objects will be available in the destination region in case the primary region fails.
For more information on CRR, please visit the following URL: https://docs.aws.amazon.com/AmazonS3/latest/dev/crr.html
The correct answers are: Enable bucket versioning and also enable CRR, For the Bucket policy add a condition for {"Null": { "aws:MultiFactorAuthAge": true}}
Submit your Feedback/Queries to our Experts

QUESTION 74

- (Exam Topic 3)
Your company makes use of S3 buckets for storing data. There is a company policy that all services should have logging enabled. How can you ensure that logging is always enabled for created S3 buckets in the AWS Account?
Please select:

  1. A. Use AWS Inspector to inspect all S3 buckets and enable logging for those where it is not enabled
  2. B. Use AWS Config Rules to check whether logging is enabled for buckets
  3. C. Use AWS Cloudwatch metrics to check whether logging is enabled for buckets
  4. D. Use AWS Cloudwatch logs to check whether logging is enabled for buckets

Correct Answer: B
This is given in the AWS Documentation as an example rule in AWS Config Example rules with triggers Example rule with configuration change trigger
* 1. You add the AWS Config managed rule, S3_BUCKET_LOGGING_ENABLED, to your account to check whether your Amazon S3 buckets have logging enabled.
* 2. The trigger type for the rule is configuration changes. AWS Config runs the evaluations for the rule when an Amazon S3 bucket is created, changed, or deleted.
* 3. When a bucket is updated, the configuration change triggers the rule and AWS Config evaluates whether the bucket is compliant against the rule.
Option A is invalid because AWS Inspector cannot be used to scan all buckets
Option C and D are invalid because Cloudwatch cannot be used to check for logging enablement for buckets. For more information on Config Rules please see the below Link:
AWS-Certified-Security-Specialty dumps exhibit https://docs.aws.amazon.com/config/latest/developerguide/evaluate-config-rules.html
The correct answer is: Use AWS Config Rules to check whether logging is enabled for buckets Submit your Feedback/Queries to our Experts

QUESTION 75

- (Exam Topic 1)
A convoys data lake uses Amazon S3 and Amazon Athena. The company's security engineer has been asked to design an encryption solution that meets the company's data protection requirements. The encryption solution must work with Amazon S3 and keys managed by the company. The encryption solution must be protected in a hardware security module that is validated id Federal information Processing Standards (FPS) 140-2 Level 3.
Which solution meets these requirements?

  1. A. Use client-side encryption with an AWS KMS customer-managed key implemented with the AWS Encryption SDK
  2. B. Use AWS CloudHSM to store the keys and perform cryptographic operations Save the encrypted text inAmazon S3
  3. C. Use an AWS KMS customer-managed key that is backed by a custom key store using AWS CloudHSM
  4. D. Use an AWS KMS customer-managed key with the bring your own key (BYOK) feature to import a key stored in AWS CloudHSM

Correct Answer: B

Page 16 of 118

Post your Comments and Discuss Amazon AWS-Certified-Security-Specialty exam with other Community members: