Which steps should the business take to safeguard the photographs and restrict their distribution?

A business stores website images in an Amazon S3 bucket. The firm serves the photos to end users through Amazon CloudFront. The firm learned lately that the photographs are being accessible from nations in which it does not have a distribution license. Which steps should the business take to safeguard...

March 30, 2024 No Comments READ MORE +

Which solution meets these requirements?

A company uses a third-party identity provider and SAML-based SSO for its AWS accounts. After the third-party identity provider renewed an expired signing certificate, users saw the following message when trying to log in: Error: Response Signature Invalid (Service: AWSSecurityTokenService; Status Code: 400; Error Code: InvalidldentityToken) A security engineer needs...

March 29, 2024 No Comments READ MORE +

What is the MOST secure way to meet these requirements?

Example.com is hosted on Amazon EC2 instances behind an Application Load Balancer (ALB). Third-party host intrusion detection system (HIDS) agents that capture the traffic of the EC2 instance are running on each host. The company must ensure they are using privacy enhancing technologies for users, without losing the assurance the...

March 29, 2024 No Comments READ MORE +

Which combination of steps should the company take to remove direct access to the S3 URL?

A company is hosting a static website on Amazon S3 The company has configured an Amazon CloudFront distribution to serve the website contents. The company has associated an IAM WAF web ACL with the CloudFront distribution. The web ACL ensures that requests originate from the United States to address compliance...

March 29, 2024 No Comments READ MORE +

Which approach should the team take to accomplish this task?

Amazon GuardDuty has detected communications to a known command and control endpoint from a company's Amazon EC2 instance. The instance was found to be running a vulnerable version of a common web framework. The company's security operations team wants to quickly identity other compute resources with the specific version of...

March 29, 2024 No Comments READ MORE +

Which Amazon Web Offerings (IAM) services should be employed to satisfy these requirements?

A business requires a forensic logging solution for hundreds of Docker-based apps running on Amazon EC2. The solution must analyze logs in real time, provide message replay, and persist logs. Which Amazon Web Offerings (IAM) services should be employed to satisfy these requirements? (Select two.)A . Amazon AthenaB . Amazon...

March 29, 2024 No Comments READ MORE +

What should the Security Engineer do to accomplish this?

A company has multiple Amazon S3 buckets encrypted with customer-managed CMKs Due to regulatory requirements the keys must be rotated every year. The company's Security Engineer has enabled automatic key rotation for the CMKs; however the company wants to verity that the rotation has occurred. What should the Security Engineer...

March 29, 2024 No Comments READ MORE +

What are some ways the engineer could achieve this (Select THREE)?

A website currently runs on Amazon EC2, wan mostly statics content on the site. Recently the site was subjected to a DDoS attack a security engineer was (asked was redesigning the edge security to help Mitigate this risk in the future. What are some ways the engineer could achieve this...

March 29, 2024 No Comments READ MORE +

Which combination of actions should the Security team take to respond to (be current modem?

A company's Security Team received an email notification from the Amazon EC2 Abuse team that one or more of the company's Amazon EC2 instances may have been compromised Which combination of actions should the Security team take to respond to (be current modem? (Select TWO.)A . Open a support case...

March 29, 2024 No Comments READ MORE +

Which combination of steps should a security engineer take before investigating the issue?

A company finds that one of its Amazon EC2 instances suddenly has a high CPU usage. The company does not know whether the EC2 instance is compromised or whether the operating system is performing background cleanup. Which combination of steps should a security engineer take before investigating the issue? (Select...

March 29, 2024 No Comments READ MORE +