Ready to Pass Your Certification Test

Ready to guarantee a pass on the certification that will elevate your career? Visit this page to explore our catalog and get the questions and answers you need to ace the test.

amazon AWS_CERTIFIED_SECURITY_SPECIALTY

Custom view settings

Exam contains 509 questions

Page 6 of 85
Question 31 🔥

During a recent internal investigation, it was discovered that all API logging was disabled in a production account, and the root user had created new API keys that appear to have been used several times.What could have been done to detect and automatically remediate the incident?

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question
Question 32 🔥

An application has a requirement to be resilient across not only Availability Zones within the application's primary region but also be available within another region altogether.Which of the following supports this requirement for AWS resources that are encrypted by AWS KMS?

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question
Question 33 🔥

An organization policy states that all encryption keys must be automatically rotated every 12 months.Which AWS Key Management Service (KMS) key type should be used to meet this requirement?

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question
Question 34 🔥

A Security Engineer received an AWS Abuse Notice listing EC2 instance IDs that are reportedly abusing other hosts.Which action should the Engineer take based on this situation? (Choose three.)

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question
Question 35 🔥

A Security Administrator is configuring an Amazon S3 bucket and must meet the following security requirements:✑ Encryption in transit✑ Encryption at rest✑ Logging of all object retrievals in AWS CloudTrailWhich of the following meet these security requirements? (Choose three.)

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question
Question 36 🔥

The Security team believes that a former employee may have gained unauthorized access to AWS resources sometime in the past 3 months by using an identified access key.What approach would enable the Security team to find out what the former employee may have done within AWS?

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question

Lorem ipsum dolor sit amet consectetur. Eget sed turpis aenean sit aenean. Integer at nam ullamcorper a.

© 2024 Exam Prepare, Inc. All Rights Reserved.