AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&as, Page 1 - ExamTopics - PDF 51-100
AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&as, Page 1 - ExamTopics - PDF 51-100
A company's AWS CloudTrail logs are all centrally stored in an Amazon S3 bucket. The security team controls the company's AWS account. The
security team must prevent unauthorized access and tampering of the CloudTrail logs.
Which combination of steps should the security team take? (Choose three.)
A. Configure server-side encryption with AWS KMS managed encryption keys (SSE-KMS). Most Voted
C. Create an Amazon EventBridge rule to notify the security team of any modifications on CloudTrail log files.
D. Implement least privilege access to the S3 bucket by configuring a bucket policy. Most Voted
A company has several petabytes of data. The company must preserve this data for 7 years to comply with regulatory requirements. The
company's compliance team asks a security officer to develop a strategy that will prevent anyone from changing or deleting the data.
A. Create an Amazon S3 bucket. Configure the bucket to use S3 Object Lock in compliance mode. Upload the data to the bucket. Create a
B. Create an Amazon S3 bucket. Configure the bucket to use S3 Object Lock in governance mode. Upload the data to the bucket. Create a
C. Create a vault in Amazon S3 Glacier. Create a Vault Lock policy in S3 Glacier that meets all the regulatory requirements. Upload the data to
D. Create an Amazon S3 bucket. Upload the data to the bucket. Use a lifecycle rule to transition the data to a vault in S3 Glacier. Create a Vault
Correct Answer: C
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 1/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A-company uses a third-party identity provider and SAML-based SSO for its AWS accounts. After the third-party identity provider renewed an
expired signing certificate, users saw the following message when trying to log in:
Error: Response Signature Invalid (Service: AWSSecurityTokenService; Status Code: 400; Error Code: InvalidIdentityToken)
A security engineer needs to provide a solution that corrects the error and minimizes operational overhead.
A. Upload the third-party signing certificate’s new private key to the AWS identity provider entity defined in AWS Identity and Access
B. Sign the identity provider's metadata file with the new public key. Upload the signature to the AWS identity provider entity defined in AWS
C. Download the updated SAML metadata file from the identity service provider. Update the file in the AWS identity provider entity defined in
AWS Identity and Access Management (IAM) by using the AWS CLI. Most Voted
D. Configure the AWS identity provider entity defined in AWS Identity and Access Management (IAM) to synchronously fetch the new public key
Correct Answer: C
A company has several workloads running on AWS. Employees are required to authenticate using on-premises ADFS and SSO to access the AWS
Management Console. Developers migrated an existing legacy web application to an Amazon EC2 instance. Employees need to access this
application from anywhere on the internet, but currently, there is no authentication system built into the application.
How should the security engineer implement employee-only access to this system without changing the application?
A. Place the application behind an Application Load Balancer (ALB). Use Amazon Cognito as authentication for the ALB. Define a SAML-based
B. Implement AWS IAM Identity Center (AWS Single Sign-On) in the management account and link it to ADFS as an identity provider. Define the
EC2 instance as a managed resource, then apply an IAM policy on the resource.
C. Define an Amazon Cognito identity pool, then install the connector on the Active Directory server. Use the Amazon Cognito SDK on the
application instance to authenticate the employees using their Active Directory user names and passwords.
D. Create an AWS Lambda custom authorizer as the authenticator for a reverse proxy on Amazon EC2. Ensure the security group on Amazon
Correct Answer: A
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 2/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A company is using AWS to run a long-running analysis process on data that is stored in Amazon S3 buckets. The process runs on a fleet of
Amazon EC2 instances that are in an Auto Scaling group. The EC2 instances are deployed in a private subnet of a VPC that does not have internet
access. The EC2 instances and the S3 buckets are in the same AWS account.
The EC2 instances access the S3 buckets through an S3 gateway endpoint that has the default access policy. Each EC2 instance is associated
with an instance profile role that has a policy that explicitly allows the s3:GetObject action and the s3:PutObject action for only the required S3
buckets.
The company learns that one or more of the EC2 instances are compromised and are exfiltrating data to an S3 bucket that is outside the
company's organization in AWS Organizations. A security engineer must implement a solution to stop this exfiltration of data and to keep the EC2
A. Update the policy on the S3 gateway endpoint to allow the S3 actions only if the values of the aws:ResourceOrgID and aws:PrincipalOrgID
B. Update the policy on the instance profile role to allow the S3 actions only if the value of the aws:ResourceOrgID condition key matches the
company's value.
C. Add a network ACL rule to the subnet of the EC2 instances to block outgoing connections on port 443.
D. Apply an SCP on the AWS account to allow the S3 actions only if the values of the aws:ResourceOrgID and aws:PrincipalOrgID condition
Correct Answer: A
A company that operates in a hybrid cloud environment must meet strict compliance requirements. The company wants to create a report that
includes evidence from on-premises workloads alongside evidence from AWS resources. A security engineer must implement a solution to collect,
review, and manage the evidence to demonstrate compliance with company policy.
A. Create an assessment in AWS Audit Manager from a prebuilt framework or a custom framework. Upload manual evidence from the on-
premises workloads. Add the evidence to the assessment. Generate an assessment report after Audit Manager collects the necessary
B. Install the Amazon CloudWatch agent on the on-premises workloads. Use AWS Config to deploy a conformance pack from a sample
conformance pack template or a custom YAML template. Generate an assessment report after AWS Config identifies noncompliant workloads
and resources.
C. Set up the appropriate security standard in AWS Security Hub. Upload manual evidence from the on-premises workloads. Wait for Security
Hub to collect the evidence from the AWS resources. Download the list of controls as a .csv file.
D. Install the Amazon CloudWatch agent on the on-premises workloads. Create a CloudWatch dashboard to monitor the on-premises
workloads and the AWS resources. Run a query on the workloads and resources. Download the results.
Correct Answer: A
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 3/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
To meet regulatory requirements, a security engineer needs to implement an IAM policy that restricts the use of AWS services to the us-east-1
Region.
A.
B.
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 4/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
C.
Most Voted
D.
Correct Answer: C
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 5/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A company has a web server in the AWS Cloud. The company will store the content for the web server in an Amazon S3 bucket. A security
engineer must use an Amazon CloudFront distribution to speed up delivery of the content. None of the files can be publicly accessible from the S3
bucket directly.
A. Configure the permissions on the individual files in the S3 bucket so that only the CloudFront distribution has access to them.
B. Create an origin access control (OAC). Associate the OAC with the CloudFront distribution. Configure the S3 bucket permissions so that
only the OAC can access the files in the S3 bucket. Most Voted
C. Create an S3 role in AWS Identity and Access Management (IAM). Allow only the CloudFront distribution to assume the role to access the
D. Create an S3 bucket policy that uses only the CloudFront distribution ID as the principal and the Amazon Resource Name (ARN) as the
target.
Correct Answer: B
A security engineer logs in to the AWS Lambda console with administrator permissions. The security engineer is trying to view logs in Amazon
CloudWatch for a Lambda function that is named myFunction. When the security engineer chooses the option in the Lambda console to view logs
The IAM policy for the Lambda function's execution role contains the following:
D. Add the logs:CreateLogStream action to the second Allow statement. Most Voted
Correct Answer: D
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 6/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A company has a new partnership with a vendor. The vendor will process data from the company's customers. The company will upload data files
as objects into an Amazon S3 bucket. The vendor will download the objects to perform data processing. The objects will contain sensitive data.
A security engineer must implement a solution that prevents objects from residing in the S3 bucket for longer than 72 hours.
A. Use Amazon Macie to scan the S3 bucket for sensitive data every 72 hours. Configure Macie to delete the objects that contain sensitive
B. Configure an S3 Lifecycle rule on the S3 bucket to expire objects that have been in the S3 bucket for 72 hours. Most Voted
C. Create an Amazon EventBridge scheduled rule that invokes an AWS Lambda function every day. Program the Lambda function to remove
D. Use the S3 Intelligent-Tiering storage class for all objects that are uploaded to the S3 bucket. Use S3 Intelligent-Tiering to expire objects
Correct Answer: B
A company accidentally deleted the private key for an Amazon Elastic Block Store (Amazon EBS)-backed Amazon EC2 instance. A security
A. Stop the instance. Detach the root volume. Generate a new key pair. Most Voted
B. Keep the instance running. Detach the root volume. Generate a new key pair.
C. When the volume is detached from the original instance, attach the volume to another instance as a data volume. Modify the
authorized_keys file with a new public key. Move the volume back to the original instance. Start the instance. Most Voted
D. When the volume is detached from the original instance, attach the volume to another instance as a data volume. Modify the
authorized_keys file with a new private key. Move the volume back to the original instance. Start the instance.
E. When the volume is detached from the original instance, attach the volume to another instance as a data volume. Modify the
authorized_keys file with a new public key. Move the volume back to the original instance that is running.
Correct Answer: AC
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 7/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A company purchased a subscription to a third-party cloud security scanning solution that integrates with AWS Security Hub. A security engineer
needs to implement a solution that will remediate the findings from the third-party scanning solution automatically.
A. Set up an Amazon EventBridge rule that reacts to new Security Hub findings. Configure an AWS Lambda function as the target for the rule
B. Set up a custom action in Security Hub. Configure the custom action to call AWS Systems Manager Automation runbooks to remediate the
findings.
C. Set up a custom action in Security Hub. Configure an AWS Lambda function as the target for the custom action to remediate the findings.
D. Set up AWS Config rules to use AWS Systems Manager Automation runbooks to remediate the findings.
Correct Answer: A
An application is running on an Amazon EC2 instance that has an IAM role attached. The IAM role provides access to an AWS Key Management
Service (AWS KMS) customer managed key and an Amazon S3 bucket. The key is used to access 2 TB of sensitive data that is stored in the S3
bucket.
A security engineer discovers a potential vulnerability on the EC2 instance that could result in the compromise of the sensitive data. Due to other
critical operations, the security engineer cannot immediately shut down the EC2 instance for vulnerability patching.
What is the FASTEST way to prevent the sensitive data from being exposed?
A. Download the data from the existing S3 bucket to a new EC2 instance. Then delete the data from the S3 bucket. Re-encrypt the data with a
B. Block access to the public range of S3 endpoint IP addresses by using a host-based firewall. Ensure that internet-bound traffic from the
C. Revoke the IAM role's active session permissions. Update the S3 bucket policy to deny access to the IAM role. Remove the IAM role from
D. Disable the current key. Create a new KMS key that the IAM role does not have access to, and re-encrypt all the data with the new key.
Correct Answer: C
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 8/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A company is building an application on AWS that will store sensitive information. The company has a support team with access to the IT
infrastructure, including databases. The company’s security engineer must introduce measures to protect the sensitive data against any data
breach while minimizing management overhead. The credentials must be regularly rotated.
A. Enable Amazon RDS encryption to encrypt the database and snapshots. Enable Amazon Elastic Block Store (Amazon EBS) encryption on
Amazon EC2 instances. Include the database credential in the EC2 user data field. Use an AWS Lambda function to rotate database
B. Install a database on an Amazon EC2 instance. Enable third-party disk encryption to encrypt the Amazon Elastic Block Store (Amazon EBS)
volume. Store the database credentials in AWS CloudHSM with automatic rotation. Set up TLS for the connection to the database.
C. Enable Amazon RDS encryption to encrypt the database and snapshots. Enable Amazon Elastic Black Store (Amazon EBS) encryption on
Amazon EC2 instances. Store the database credentials in AWS Secrets Manager with automatic rotation. Set up TLS for the connection to the
D. Set up an AWS CloudHSM cluster with AWS Key Management Service (AWS KMS) to store KMS keys. Set up Amazon RDS encryption using
AWS KMS to encrypt the database. Store database credentials in the AWS Systems Manager Parameter Store with automatic rotation. Set up
Correct Answer: C
A company is using Amazon Route 53 Resolver for its hybrid DNS infrastructure. The company has set up Route 53 Resolver forwarding rules for
A new security mandate requires the company to implement a solution to log and query DNS traffic that goes to the on-premises DNS servers. The
logs must show details of the source IP address of the instance from which the query originated. The logs also must show the DNS name that
A. Use VPC Traffic Mirroring. Configure all relevant elastic network interfaces as the traffic source, include amazon-dns in the mirror filter, and
set Amazon CloudWatch Logs as the mirror target. Use CloudWatch Insights on the mirror session logs to run queries on the source IP
B. Configure VPC flow logs on all relevant VPCs. Send the logs to an Amazon S3 bucket. Use Amazon Athena to run SQL queries on the source
C. Configure Route 53 Resolver query logging on all relevant VPCs. Send the logs to Amazon CloudWatch Logs. Use CloudWatch Insights to
run queries on the source IP address and DNS name. Most Voted
D. Modify the Route 53 Resolver rules on the authoritative domains that forward to the on-premises DNS servers. Send the logs to an Amazon
S3 bucket. Use Amazon Athena to run SQL queries on the source IP address and DNS name.
Correct Answer: C
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 9/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A security engineer is configuring account-based access control (ABAC) to allow only specific principals to put objects into an Amazon S3 bucket.
The security engineer needs to configure a bucket policy that allows principals to put objects into the S3 bucket only if the value of the Team tag
on the object matches the value of the Team tag that is associated with the principal. During testing, the security engineer notices that a principal
can still put objects into the S3 bucket when the tag values do not match.
Which combination of factors are causing the PutObject operation to succeed when the tag values are different? (Choose two.)
A. The principal's identity-based policy grants access to put objects into the S3 bucket with no conditions. Most Voted
B. The principal's identity-based policy overrides the condition because the identity-based policy contains an explicit allow.
C. The S3 bucket's resource policy does not deny access to put objects. Most Voted
E. The bucket policy does not apply to principals in the same zone of trust.
Correct Answer: AC
A company is hosting multiple applications within a single VPC in its AWS account. The applications are running behind an Application Load
Balancer that is associated with an AWS WAF web ACL. The company's security team has identified that multiple port scans are originating from a
A. Modify the AWS WAF web ACL with an IP set match rule statement to deny incoming requests from the IP address range. Most Voted
B. Add a rule to all security groups to deny the incoming requests from the IP address range.
C. Modify the AWS WAF web ACL with a rate-based rule statement to deny the incoming requests from the IP address range.
D. Configure the AWS WAF web ACL with regex match conditions. Specify a pattern set to deny the incoming requests based on the match
condition.
Correct Answer: A
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 10/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A company has contracted with a third party to audit several AWS accounts. To enable the audit, cross-account IAM roles have been created in
each account targeted for audit. The auditor is having trouble accessing some of the accounts.
C. The auditor has not been granted sts:AssumeRole for the role in the destination account. Most Voted
D. The Amazon EC2 role used by the auditor must be set to the destination account role.
F. The role ARN used by the auditor is missing or incorrect. Most Voted
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 11/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A security engineer needs to configure an Amazon S3 bucket policy to restrict access to an S3 bucket that is named DOC-EXAMPLE-BUCKET. The
policy must allow access to only DOC-EXAMPLE-BUCKET from only the following endpoint: vpce-1a2b3c4d. The policy must deny all access to
A.
B.
Most Voted
C.
D.
Correct Answer: B
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 12/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A company has a group of Amazon EC2 instances in a single private subnet of a VPC with no internet gateway attached. A security engineer has
installed the Amazon CloudWatch agent on all instances in that subnet to capture logs from a specific application. To ensure that the logs flow
securely, the company's networking team has created VPC endpoints for CloudWatch monitoring and CloudWatch logs. The networking team has
The application is generating logs However, when the security engineer queries CloudWatch, the logs do not appear.
Which combination of steps should the security engineer take to troubleshoot this issue? (Choose three.)
A. Ensure that the EC2 instance profile that is attached to the EC2 instances has permissions to create log streams and write logs. Most Voted
B. Create a metric filter on the logs so that they can be viewed in the AWS Management Console.
C. Check the CloudWatch agent configuration file on each EC2 instance to make sure that the CloudWatch agent is collecting the proper log
D. Check the VPC endpoint policies of both VPC endpoints to ensure that the EC2 instances have permissions to use them. Most Voted
E. Create a NAT gateway in the subnet so that the EC2 instances can communicate with CloudWatch.
F. Ensure that the security groups allow all the EC2 instances to communicate with each other to aggregate logs before sending.
A company uses AWS Signer with all of the company's AWS Lambda functions. A developer recently stopped working for the company. The
company wants to ensure that all the code that the developer wrote can no longer be deployed to the Lambda functions.
A. Revoke all versions of the signing profile assigned to the developer. Most Voted
B. Examine the developer's IAM roles. Remove all permissions that grant access to Signer.
C. Re-encrypt all source code with a new AWS Key Management Service (AWS KMS) key.
D. Use Amazon CodeGuru to profile all the code that the Lambda functions use.
Correct Answer: A
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 13/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A company plans to use AWS Key Management Service (AWS KMS) to implement an encryption strategy to protect data at rest. The company
requires client-side encryption for company projects. The company is currently conducting multiple projects to test the company's use of AWS
KMS. These tests have led to a sudden increase in the company's AWS resource consumption. The test projects include applications that issue
The company needs to develop a solution that does not throttle the company's ability to use AWS KMS. The solution must improve key usage for
A. Use keyrings with the AWS Encryption SDK. Use each keyring individually or combine keyrings into a multi-keyring. Decrypt the data by
B. Use data key caching. Use the local cache that the AWS Encryption SDK provides with a caching cryptographic materials manager.
Most Voted
C. Use KMS key rotation. Use a local cache in the AWS Encryption SDK with a caching cryptographic materials manager.
D. Use keyrings with the AWS Encryption SDK. Use each keyring individually or combine keyrings into a multi-keyring. Use any of the wrapping
Correct Answer: B
A security team is working on a solution that will use Amazon EventBridge to monitor new Amazon S3 objects. The solution will monitor for public
access and for changes to any S3 bucket policy or setting that result in public access. The security team configures EventBridge to watch for
specific API calls that are logged from AWS CloudTrail. EventBridge has an action to send an email notification through Amazon Simple
Notification Service (Amazon SNS) to the security team immediately with details of the API call.
Specifically, the security team wants EventBridge to watch for the s3:PutObjectAcl, s3:DeleteBucketPolicy, and s3:PutBucketPolicy API invocation
logs from CloudTrail. While developing the solution in a single account, the security team discovers that the s3:PutObjectAcl API call does not
invoke an EventBridge event However, the s3:DeleteBucketPolicy API call and the s3:PutBucketPolicy API call do invoke an event.
The security team has enabled CloudTrail for AWS management events with a basic configuration in the AWS Region in which EventBridge is being
tested. Verification of the EventBridge event pattern indicates that the pattern is set up correctly. The security team must implement a solution so
that the s3:PutObjectAcl API call will invoke an EventBridge event. The solution must not generate false notifications.
A. Modify the EventBridge event pattern by selecting Amazon S3. Select All Events as the event type.
B. Modify the EventBridge event pattern by selecting Amazon S3. Select Bucket Level Operations as the event type.
D. Enable CloudTrail to monitor data events for read and write operations to S3 buckets. Most Voted
Correct Answer: D
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 14/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A company uses Amazon GuardDuty. The company's security team wants all High severity findings to automatically generate a ticket in a third-
A. Create a verified identity for the third-party ticketing email system in Amazon Simple Email Service (Amazon SES). Create an Amazon
EventBridge rule that includes an event pattern that matches High severity GuardDuty findings. Specify the SES identity as the target for the
EventBridge rule.
B. Create an Amazon Simple Notification Service (Amazon SNS) topic. Subscribe the third-party ticketing email system to the SNS topic.
Create an Amazon EventBridge rule that includes an event pattern that matches High severity GuardDuty findings. Specify the SNS topic as the
C. Use the GuardDuty CreateFilter API operation to build a filter in GuardDuty to monitor for High severity findings. Export the results of the
filter to an Amazon Simple Notification Service (Amazon SNS) topic. Subscribe the third-party ticketing email system to the SNS topic.
D. Use the GuardDuty CreateFilter API operation to build a filter in GuardDuty to monitor for High severity findings. Create an Amazon Simple
Notification Service (Amazon SNS) topic. Subscribe the third-party ticketing email system to the SNS topic. Create an Amazon EventBridge
rule that includes an event pattern that matches GuardDuty findings that are selected by the filter. Specify the SNS topic as the target for the
EventBridge rule.
Correct Answer: B
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 15/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A company is using AWS Organizations to implement a multi-account strategy. The company does not have on-premises infrastructure. All
workloads run on AWS. The company currently has eight member accounts. The company anticipates that it will have no more than 20 AWS
The company issues a new security policy that contains the following requirements:
• No AWS account should use a VPC within the AWS account for workloads.
• The company should use a centrally managed VPC that all AWS accounts can access to launch workloads in subnets.
• No AWS account should be able to modify another AWS account's application resources within the centrally managed VPC.
• The centrally managed VPC should reside in an existing AWS account that is named Ac-count-A within an organization.
The company uses an AWS CloudFormation template to create a VPC that contains multiple subnets in Account-A. This template exports the
Which solution will complete the security setup to meet these requirements?
A. Use a CloudFormation template in the member accounts to launch workloads. Configure the template to use the Fn::ImportValue function
B. Use a transit gateway in the VPC within Account-A. Configure the member accounts to use the transit gateway to access the subnets in
C. Use AWS Resource Access Manager (AWS RAM) to share Account-A's VPC subnets with the remaining member accounts. Configure the
member accounts to use the shared subnets to launch workloads. Most Voted
D. Create a peering connection between Account-A and the remaining member accounts. Configure the member accounts to use the subnets
Correct Answer: C
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 16/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A company's security team needs to receive a notification whenever an AWS access key has not been rotated in 90 or more days. A security
Which solution will meet these requirements with the LEAST amount of effort?
A. Deploy an AWS Config managed rule to run on a periodic basis of 24 hours. Select the access-keys-rotated managed rule, and set the
maxAccessKeyAge parameter to 90 days. Create an Amazon EventBridge rule with an event pattern that matches the compliance type of
NON_ COMPLIANT from AWS Config for the managed rule. Configure EventBridge to send an Amazon Simple Notification Service (Amazon
B. Create a script to export a .csv file from the AWS Trusted Advisor check for IAM access key rotation. Load the script into an AWS Lambda
function that will upload the .csv file to an Amazon S3 bucket. Create an Amazon Athena table query that runs when the .csv file is uploaded
to the S3 bucket. Publish the results for any keys older than 90 days by using an invocation of an Amazon Simple Notification Service
C. Create a script to download the IAM credentials report on a periodic basis. Load the script into an AWS Lambda function that will run on a
schedule through Amazon EventBridge. Configure the Lambda script to load the report into memory and to filter the report for records in which
the key was last rotated at least 90 days ago. If any records are detected, send an Amazon Simple Notification Service (Amazon SNS)
D. Create an AWS Lambda function that queries the IAM API to list all the users. Iterate through the users by using the ListAccessKeys
operation. Verify that the value in the CreateDate field is not at least 90 days old. Send an Amazon Simple Notification Service (Amazon SNS)
notification to the security team if the value is at least 90 days old. Create an Amazon EventBridge rule to schedule the Lambda function to
Correct Answer: A
A company maintains an open-source application that is hosted on a public GitHub repository. While creating a new commit to the repository, an
engineer uploaded their AWS access key and secret access key. The engineer reported the mistake to a manager, and the manager immediately
The company needs to assess the impact of the exposed access key. A security engineer must recommend a solution that requires the least
A. Analyze an AWS Identity and Access Management (IAM) use report from AWS Trusted Advisor to see when the access key was last used.
B. Analyze Amazon CloudWatch Logs for activity by searching for the access key.
C. Analyze VPC flow logs for activity by searching for the access key.
D. Analyze a credential report in AWS Identity and Access Management (IAM) to see when the access key was last used. Most Voted
Correct Answer: D
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 17/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A company plans to create individual child accounts within an existing organization in AWS Organizations for each of its DevOps teams. AWS
CloudTrail has been enabled and configured on all accounts to write audit logs to an Amazon S3 bucket in a centralized AWS account. A security
engineer needs to ensure that DevOps team members are unable to modify or disable this configuration.
A. Create an IAM policy that prohibits changes to the specific CloudTrail trail and apply the policy to the AWS account root user.
B. Create an S3 bucket policy in the specified destination account for the CloudTrail trail that prohibits configuration changes from the AWS
C. Create an SCP that prohibits changes to the specific CloudTrail trail and apply the SCP to the appropriate organizational unit or account in
D. Create an IAM policy that prohibits changes to the specific CloudTrail trail and apply the policy to a new IAM group. Have team members
use individual IAM accounts that are members of the new IAM group.
Correct Answer: C
A company's policy requires that all API keys be encrypted and stored separately from source code in a centralized security account. This security
account is managed by the company's security team. However, an audit revealed that an API key is stored with the source code of an AWS Lambda
How should the security team securely store the API key?
A. Create a CodeCommit repository in the security account using AWS Key Management Service (AWS KMS) for encryption. Require the
B. Store the API key in an Amazon S3 bucket in the security account using server-side encryption with Amazon S3 managed encryption keys
(SSE-S3) to encrypt the key. Create a presigned URL for the S3 key, and specify the URL in a Lambda environmental variable in the AWS
CloudFormation template. Update the Lambda function code to retrieve the key using the URL and call the API.
C. Create a secret in AWS Secrets Manager in the security account to store the API key using AWS Key Management Service (AWS KMS) for
encryption. Grant access to the IAM role used by the Lambda function so that the function can retrieve the key from Secrets Manager and call
D. Create an encrypted environment variable for the Lambda function to store the API key using AWS Key Management Service (AWS KMS) for
encryption. Grant access to the IAM role used by the Lambda function so that the function can decrypt the key at runtime.
Correct Answer: C
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 18/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A security engineer is asked to update an AWS CloudTrail log file prefix for an existing trail. When attempting to save the change in the CloudTrail
console, the security engineer receives the following error message: "There is a problem with the bucket policy."
A. Create a new trail with the updated log file prefix, and then delete the original trail. Update the existing bucket policy in the Amazon S3
console with the new log file prefix, and then update the log file prefix in the CloudTrail console.
B. Update the existing bucket policy in the Amazon S3 console to allow the security engineer's principal to perform PutBucketPolicy, and then
C. Update the existing bucket policy in the Amazon S3 console with the new log file prefix, and then update the log file prefix in the CloudTrail
D. Update the existing bucket policy in the Amazon S3 console to allow the security engineer's principal to perform GetBucketPolicy, and then
Correct Answer: C
A company uses AWS Organizations. The company wants to implement short-term credentials for third-party AWS accounts to use to access
accounts within the company's organization. Access is for the AWS Management Console and third-party software-as-a-service (SaaS)
applications. Trust must be enhanced to prevent two external accounts from using the same credentials. The solution must require the least
A. Use a bearer token authentication with OAuth or SAML to manage and share a central Amazon Cognito user pool across multiple Amazon
B. Implement AWS IAM Identity Center (AWS Single Sign-On), and use an identity source of choice. Grant access to users and groups from
C. Create a unique IAM role for each external account. Create a trust policy Use AWS Secrets Manager to create a random external key.
D. Create a unique IAM role for each external account. Create a trust policy that includes a condition that uses the sts:ExternalId condition
Correct Answer: D
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 19/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A company is evaluating its security posture. In the past, the company has observed issues with specific hosts and host header combinations that
affected the company's business. The company has configured AWS WAF web ACLs as an initial step to mitigate these issues.
The company must create a log analysis solution for the AWS WAF web ACLs to monitor problematic activity. The company wants to process all
the AWS WAF logs in a central location. The company must have the ability to filter out requests based on specific hosts.
A security engineer starts to enable access logging for the AWS WAF web ACLs.
What should the security engineer do next to meet these requirements with the MOST operational efficiency?
A. Specify Amazon Redshift as the destination for the access logs. Deploy the Amazon Athena Redshift connector. Use Athena to query the
B. Specify Amazon CloudWatch as the destination for the access logs. Use Amazon CloudWatch Logs Insights to design a query to filter the
C. Specify Amazon CloudWatch as the destination for the access logs. Export the CloudWatch logs to an Amazon S3 bucket. Use Amazon
D. Specify Amazon CloudWatch as the destination for the access logs. Use Amazon Redshift Spectrum to query the logs and to filter the logs
by host.
Correct Answer: B
A security engineer is trying to use Amazon EC2 Image Builder to create an image of an EC2 instance. The security engineer has configured the
pipeline to send logs to an Amazon S3 bucket. When the security engineer runs the pipeline, the build fails with the following error:
The security engineer must resolve the error by implementing a solution that complies with best practices for least privilege access.
A. Ensure that the following policies are attached to the IAM role that the security engineer is using·EC2InstanceProfileForImageBuilder,
B. Ensure that the following policies are attached to the instance profile for the EC2 instance: EC2InstanceProfileForImageBuilder,
C. Ensure that the AWSImageBuilderFullAccess policy is attached to the instance profile for the EC2 instance.
D. Ensure that the security engineer's IAM role has the s3:PutObject permission for the S3 bucket.
E. Ensure that the instance profile for the EC2 instance has the s3:PutObject permission for the S3 bucket. Most Voted
Correct Answer: BE
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 20/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A security engineer must use AWS Key Management Service (AWS KMS) to design a key management solution for a set of Amazon Elastic Block
Store (Amazon EBS) volumes that contain sensitive data. The solution needs to ensure that the key material automatically expires in 90 days.
A. A customer managed key that uses customer provided key material Most Voted
Correct Answer: A
A security engineer is building a Java application that is running on Amazon EC2. The application communicates with an Amazon RDS instance
Which combination of steps can the engineer take to protect the credentials and minimize downtime when the credentials are rotated? (Choose
two.)
A. Have a database administrator encrypt the credentials and store the ciphertext in Amazon S3. Grant permission to the instance role
associated with the EC2 instance to read the object and decrypt the ciphertext.
B. Configure a scheduled job that updates the credential in AWS Systems Manager Parameter Store and notifies the engineer that the
D. Store the credential in an encrypted string parameter in AWS Systems Manager Parameter Store. Grant permission to the instance role
associated with the EC2 instance to access the parameter and the AWS KMS key that is used to encrypt it.
E. Configure the Java application to catch a connection failure and make a call to AWS Secrets Manager to retrieve updated credentials when
the password is rotated. Grant permission to the instance role associated with the EC2 instance to access Secrets Manager. Most Voted
Correct Answer: CE
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 21/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A company uses SAML federation to grant users access to AWS accounts. A company workload that is in an isolated AWS account runs on
immutable infrastructure with no human access to Amazon EC2. The company requires a specialized user known as a break glass user to have
access to the workload AWS account and instances in the case of SAML errors. A recent audit discovered that the company did not create the
break glass user for the AWS account that contains the workload.
The company must create the break glass user. The company must log any activities of the break glass user and send the logs to a security team.
A. Create a local individual break glass IAM user for the security team. Create a trail in AWS CloudTrail that has Amazon CloudWatch Logs
turned on. Use Amazon EventBridge to monitor local user activities. Most Voted
B. Create a break glass EC2 key pair for the AWS account. Provide the key pair to the security team. Use AWS CloudTrail to monitor key pair
activity. Send notifications to the security team by using Amazon Simple Notification Service (Amazon SNS).
C. Create a break glass IAM role for the account. Allow security team members to perform the AssumeRoleWithSAML operation. Create an
AWS CloudTrail trail that has Amazon CloudWatch Logs turned on. Use Amazon EventBridge to monitor security team activities.
D. Create a local individual break glass IAM user on the operating system level of each workload instance. Configure unrestricted security
groups on the instances to grant access to the break glass IAM users.
E. Configure AWS Systems Manager Session Manager for Amazon EC2. Configure an AWS CloudTrail filter based on Session Manager. Send
the results to an Amazon Simple Notification Service (Amazon SNS) topic. Most Voted
Correct Answer: AE
A security engineer is working with a product team building a web application on AWS. The application uses Amazon S3 to host the static content,
Amazon API Gateway to provide RESTful services, and Amazon DynamoDB as the backend data store. The users already exist in a directory that is
Which combination of the following actions should the engineer take to allow users to be authenticated into the web application and call APIs?
(Choose three.)
B. Configure a SAML identity provider in Amazon Cognito to map attributes to the Amazon Cognito user pool attributes. Most Voted
C. Configure the SAML identity provider to add the Amazon Cognito user pool as a relying party. Most Voted
D. Configure an Amazon Cognito identity pool to integrate with social login providers.
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 22/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A company needs to improve its ability to identify and prevent IAM policies that grant public access or cross-account access to resources. The
company has implemented AWS Organizations and has started using AWS Identity and Access Management Access Analyzer to refine overly
A security engineer must automate a response in the company's organization for any newly created policies that are overly permissive. The
automation must remediate external access and must notify the company's security team.
Which combination of steps should the security engineer take to meet these requirements? (Choose three.)
A. Create an AWS Step Functions state machine that checks the resource type in the finding and adds an explicit Deny statement in the trust
policy for the IAM role. Configure the state machine to publish a notification to an Amazon Simple Notification Service (Amazon SNS) topic.
Most Voted
B. Create an AWS Batch job that forwards any resource type findings to an AWS Lambda function. Configure the Lambda function to add an
explicit Deny statement in the trust policy for the IAM role. Configure the AWS Batch job to publish a notification to an Amazon Simple
C. In Amazon EventBridge, create an event rule that matches active IAM Access Analyzer findings and invokes AWS Step Functions for
D. In Amazon CloudWatch, create a metric filter that matches active IAM Access Analyzer findings and invokes AWS Batch for resolution.
E. Create an Amazon Simple Queue Service (Amazon SQS) queue. Configure the queue to forward a notification to the security team that an
external principal has been granted access to the specific IAM role and has been blocked.
F. Create an Amazon Simple Notification Service (Amazon SNS) topic for external or cross-account access notices. Subscribe the security
A security engineer is configuring a mechanism to send an alert when three or more failed sign-in attempts to the AWS Management Console
occur during a 5-minute period. The security engineer creates a trail in AWS CloudTrail to assist in this work.
A. In CloudTrail, turn on Insights events on the trail. Configure an alarm on the insight with eventName matching ConsoleLogin and
B. Configure CloudTrail to send events to Amazon CloudWatch Logs. Create a metric filter for the relevant log group. Create a filter pattern
with eventName matching ConsoleLogin and errorMessage matching "Failed authentication". Create a CloudWatch alarm with a threshold of 3
C. Create an Amazon Athena table from the CloudTrail events. Run a query for eventName matching ConsoleLogin and for errorMessage
matching "Failed authentication". Create a notification action from the query to send an Amazon Simple Notification Service (Amazon SNS)
D. In AWS Identity and Access Management Access Analyzer, create a new analyzer. Configure the analyzer to send an Amazon Simple
Notification Service (Amazon SNS) notification when a failed sign-in event occurs 3 times for any IAM user within a period of 5 minutes.
Correct Answer: B
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 23/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A company's security engineer is developing an incident response plan to detect suspicious activity in an AWS account for VPC hosted resources.
The security engineer needs to provide visibility for as many AWS Regions as possible.
Which combination of steps will meet these requirements MOST cost-effectively? (Choose two.)
D. Create an Amazon Simple Notification Service (Amazon SNS) topic. Create an Amazon EventBridge rule that responds to findings and
E. Create an AWS Lambda function. Create an Amazon EventBridge rule that invokes the Lambda function to publish findings to Amazon
Correct Answer: BD
A company stores images for a website in an Amazon S3 bucket. The company is using Amazon CloudFront to serve the images to end users. The
company recently discovered that the images are being accessed from countries where the company does not have a distribution license.
Which actions should the company take to secure the images to limit their distribution? (Choose two.)
A. Update the S3 bucket policy to restrict access to a CloudFront origin access control (OAC). Most Voted
B. Update the website DNS record to use an Amazon Route 53 geolocation record deny list of countries where the company lacks a license.
C. Add a CloudFront geo restriction deny list of countries where the company lacks a license. Most Voted
D. Update the S3 bucket policy with a deny list of countries where the company lacks a license.
E. Enable the Restrict Viewer Access option in CloudFront to create a deny list of countries where the company lacks a license.
Correct Answer: AC
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 24/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A company has deployed servers on Amazon EC2 instances in a VPC. External vendors access these servers over the internet. Recently, the
company deployed a new application on EC2 instances in a new CIDR range. The company needs to make the application available to the vendors.
A security engineer verified that the associated security groups and network ACLs are allowing the required ports in the inbound direction.
A. Modify the security group that is associated with the EC2 instances to have the same outbound rules as inbound rules.
B. Modify the network ACL that is associated with the CIDR range to allow outbound traffic to ephemeral ports. Most Voted
C. Modify the inbound rules on the internet gateway to allow the required ports.
D. Modify the network ACL that is associated with the CIDR range to have the same outbound rules as inbound rules.
Correct Answer: B
A company uses infrastructure as code (IaC) to create AWS infrastructure. The company writes the code as AWS CloudFormation templates to
deploy the infrastructure. The company has an existing CI/CD pipeline that the company can use to deploy these templates.
After a recent security audit, the company decides to adopt a policy-as-code approach to improve the company's security posture on AWS. The
company must prevent the deployment of any infrastructure that would violate a security policy, such as an unencrypted Amazon Elastic Block
A. Turn on AWS Trusted Advisor. Configure security notifications as webhooks in the preferences section of the CI/CD pipeline.
B. Turn on AWS Config. Use the prebuilt rules or customized rules. Subscribe tile CI/CD pipeline to an Amazon Simple Notification Service
C. Create rule sets in AWS CloudFormation Guard. Run validation checks for CloudFormation templates as a phase of the CI/CD process.
Most Voted
D. Create rule sets as SCPs. Integrate the SCPs as a part of validation control in a phase of the CI/CD process.
Correct Answer: C
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 25/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A company is running an Amazon RDS for MySQL DB instance in a VPC. The VPC must not send or receive network traffic through the internet.
A security engineer wants to use AWS Secrets Manager to rotate the DB instance credentials automatically. Because of a security policy, the
security engineer cannot use the standard AWS Lambda function that Secrets Manager provides to rotate the credentials.
The security engineer deploys a custom Lambda function in the VPC. The custom Lambda function will be responsible for rotating the secret in
Secrets Manager. The security engineer edits the DB instance's security group to allow connections from this function. When the function is
invoked, the function cannot communicate with Secrets Manager to rotate the secret properly.
What should the security engineer do so that the function can rotate the secret?
A. Add an egress-only internet gateway to the VPC. Allow only the Lambda function's subnet to route traffic through the egress-only internet
gateway.
B. Add a NAT gateway to the VPC. Configure only the Lambda function's subnet with a default route through the NAT gateway.
C. Configure a VPC peering connection to the default VPC for Secrets Manager. Configure the Lambda function's subnet to use the peering
D. Configure a Secrets Manager interface VPC endpoint. Include the Lambda function's private subnet during the configuration process.
Most Voted
Correct Answer: D
The security engineer is managing a traditional three-tier web application that is running on Amazon EC2 instances. The application has become
What steps should the security engineer take to check for known vulnerabilities and limit the attack surface? (Choose two.)
A. Use AWS Certificate Manager to encrypt all traffic between the client and application servers.
B. Review the application security groups to ensure that only the necessary ports are open. Most Voted
D. Use Amazon Inspector to periodically scan the backend instances. Most Voted
E. Use AWS Key Management Service (AWS KMS) to encrypt all the traffic between the client and application servers.
Correct Answer: BD
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 26/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A company is using Amazon Elastic Container Service (Amazon ECS) to run its container-based application on AWS. The company needs to
ensure that the container images contain no severe vulnerabilities. The company also must ensure that only specific IAM roles and specific AWS
Which solution will meet these requirements with the LEAST management overhead?
A. Pull images from the public container registry. Publish the images to Amazon Elastic Container Registry (Amazon ECR) repositories with
scan on push configured in a centralized AWS account. Use a CI/CD pipeline to deploy the images to different AWS accounts. Use identity-
based policies to restrict access to which IAM principals can access the images.
B. Pull images from the public container registry. Publish the images to a private container registry that is hosted on Amazon EC2 instances in
a centralized AWS account. Deploy host-based container scanning tools to EC2 instances that run Amazon ECS. Restrict access to the
C. Pull images from the public container registry. Publish the images to Amazon Elastic Container Registry (Amazon ECR) repositories with
scan on push configured in a centralized AWS account. Use a CI/CD pipeline to deploy the images to different AWS accounts. Use repository
policies and identity-based policies to restrict access to which IAM principals and accounts can access the images. Most Voted
D. Pull images from the public container registry. Publish the images to AWS CodeArtifact repositories in a centralized AWS account. Use a
CI/CD pipeline to deploy the images to different AWS accounts. Use repository policies and identity-based policies to restrict access to which
Correct Answer: C
A company's data scientists want to create artificial intelligence and machine learning (AI/ML) training models by using Amazon SageMaker. The
training models will use large datasets in an Amazon S3 bucket. The datasets contain sensitive information.
On average, the data scientists need 30 days to train models. The S3 bucket has been secured appropriately. The company's data retention policy
states that all data that is older than 45 days must be removed from the S3 bucket.
Which action should a security engineer take to enforce this data retention policy?
A. Configure an S3 Lifecycle rule on the S3 bucket to delete objects after 45 days. Most Voted
B. Create an AWS Lambda function to check the last-modified date of the S3 objects and delete objects that are older than 45 days. Create an
S3 event notification to invoke the Lambda function for each PutObject operation.
C. Create an AWS Lambda function to check the last-modified date of the S3 objects and delete objects that are older than 45 days. Create an
D. Configure S3 Intelligent-Tiering on the S3 bucket to automatically transition objects to another storage class.
Correct Answer: A
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 27/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A security engineer is troubleshooting an AWS Lambda function that is named MyLambdaFunction. The function is encountering an error when the
function attempts to read the objects in an Amazon S3 bucket that is named DOC-EXAMPLE-BUCKET. The S3 bucket has the following bucket
policy:
Which change should the security engineer make to the policy to ensure that the Lambda function can read the bucket objects?
A. Remove the Condition element. Change the Principal element to the following:
D. Change the Resource element to "arn:aws:lambda:::function:MyLambdaFunction". Change the Principal element to the following:
Correct Answer: C
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 28/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
An IAM user receives an Access Denied message when the user attempts to access objects in an Amazon S3 bucket. The user and the S3 bucket
are in the same AWS account. The S3 bucket is configured to use server-side encryption with AWS KMS keys (SSE-KMS) to encrypt all of its
objects at rest by using a customer managed key from the same AWS account. The S3 bucket has no bucket policy defined. The IAM user has
been granted permissions through an IAM policy that allows the kms:Decrypt permission to the customer managed key. The IAM policy also
allows the s3:List* and s3:Get* permissions for the S3 bucket and its objects.
Which of the following is a possible reason that the IAM user cannot access the objects in the S3 bucket?
B. The S3 bucket has been changed to use the AWS managed key to encrypt objects at rest.
C. An S3 bucket policy needs to be added to allow the IAM user to access the objects.
D. The KMS key policy has been edited to remove the ability for the AWS account to have full access to the key. Most Voted
Correct Answer: D
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 29/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
A company has a guideline that mandates the encryption of all Amazon S3 bucket data in transit. A security engineer must implement an S3
A.
B.
Most Voted
C.
D.
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 30/31
1/15/25, 6:08 PM AWS Certified Security - Specialty SCS-C02 Exam - Free Exam Q&As, Page 1 | ExamTopics
Correct Answer: B
https://www.examtopics.com/exams/amazon/aws-certified-security-specialty-scs-c02/view/ 31/31