Which combination of steps should the security engineer take to allow the EC2 instances that are running in these two subnets to communicate again?

An AWS account that is used for development projects has a VPC that contains two subnets. The first subnet is named public-subnet-1 and has the CIDR block 192.168.1.0/24 assigned. The other subnet is named private-subnet-2 and has the CIDR block 192.168.2.0/24 assigned. Each subnet contains Amazon EC2 instances. Each subnet...

April 6, 2024 No Comments READ MORE +

Which combination of steps must the company perform to meet this requirement?

A company is using AWS Organizations to manage multiple accounts. The company needs to allow an IAM user to use a role to access resources that are in another organization's AWS account. Which combination of steps must the company perform to meet this requirement? (Select TWO.)A . Create an identity...

April 6, 2024 No Comments READ MORE +

Which solution will meet these requirements?

A company deployed IAM Organizations to help manage its increasing number of IAM accounts. A security engineer wants to ensure only principals in the Organization structure can access a specic Amazon S3 bucket. The solution must also minimize operational overhead Which solution will meet these requirements?A . 1 Put all...

April 6, 2024 No Comments READ MORE +

What is the BEST way to monitor, on a recurring basis, whether all EBS volumes are encrypted?

Auditors for a health care company have mandated that all data volumes be encrypted at rest Infrastructure is deployed mainly via IAM CloudFormation however third-party frameworks and manual deployment are required on some legacy systems What is the BEST way to monitor, on a recurring basis, whether all EBS volumes...

April 6, 2024 No Comments READ MORE +

Which solution would allow the company to securely rotate the secrets?

A company is using IAM Secrets Manager to store secrets for its production Amazon RDS database. The Security Officer has asked that secrets be rotated every 3 months. Which solution would allow the company to securely rotate the secrets? (Select TWO.)A . Place the RDS instance in a public subnet...

April 6, 2024 No Comments READ MORE +

Which of the following are valid configurations for using SSL certificates with Amazon CloudFront? (Select THREE)

Which of the following are valid configurations for using SSL certificates with Amazon CloudFront? (Select THREE) A. Default AWS Certificate Manager certificate B. Custom SSL certificate stored in AWS KMS C. Default CloudFront certificate D. Custom SSL certificate stored in AWS Certificate Manager E. Default SSL certificate stored in AWS...

April 6, 2024 No Comments READ MORE +

Which combination of steps will meet these requirements with the LEAST effort?

A company uses Amazon API Gateway to present REST APIs to users. An API developer wants to analyze API access patterns without the need to parse the log files. Which combination of steps will meet these requirements with the LEAST effort? (Select TWO.)A . Configure access logging for the required...

April 6, 2024 No Comments READ MORE +

What should the Security Engineer do to troubleshoot this issue?

A Security Engineer is troubleshooting an issue with a company's custom logging application. The application logs are written to an Amazon S3 bucket with event notifications enabled to send events lo an Amazon SNS topic. All logs are encrypted at rest using an IAM KMS CMK. The SNS topic is...

April 6, 2024 No Comments READ MORE +

How will the security engineer be able to comply with these requirements?

Within a VPC, a corporation runs an Amazon RDS Multi-AZ DB instance. The database instance is connected to the internet through a NAT gateway via two subnets. Additionally, the organization has application servers that are hosted on Amazon EC2 instances and use the RDS database. These EC2 instances have been...

April 6, 2024 No Comments READ MORE +