Question 6 of 509

An application is currently secured using network access control lists and security groups. Web servers are located in public subnets behind an Application Load

Balancer (ALB); application servers are located in private subnets.

How can edge security be enhanced to safeguard the Amazon EC2 instances against attack? (Choose two.)

    Correct Answer: B, C

    Enhancing edge security entails both protecting the application from direct attacks and efficiently managing traffic routes. Moving web servers to private subnets without public IP addresses increases security by only allowing access through the Application Load Balancer, thus reducing exposure to direct attacks. Configuring AWS WAF provides an additional layer of security by protecting against web-layer attacks, including DDoS and malicious bots, which helps secure the ALB and, consequently, the EC2 instances.

Question 7 of 509

A Security Administrator is restricting the capabilities of company root user accounts. The company uses AWS Organizations and has enabled it for all feature sets, including consolidated billing. The top-level account is used for billing and administrative purposes, not for operational AWS resource purposes.

How can the Administrator restrict usage of member root user accounts across the organization?

    Correct Answer: C

    To restrict the usage of member root user accounts across an AWS organization, the most effective method is to use Service Control Policies (SCPs). SCPs can be applied at the organizational unit (OU) level and impose restrictions on what actions users and even the root user in member accounts can perform. Creating an OU and applying a specifically tailored SCP to it ensures control over the root user's actions across all member accounts within that OU. This is the most appropriate approach given the capabilities and features of AWS Organizations.

Question 8 of 509

A Systems Engineer has been tasked with configuring outbound mail through Simple Email Service (SES) and requires compliance with current TLS standards.

The mail application should be configured to connect to which of the following endpoints and corresponding ports?

    Correct Answer: C

    To configure outbound mail through Amazon Simple Email Service (SES) while ensuring compliance with current TLS standards, the mail application should use the SMTP protocol. The correct endpoint for SES SMTP is email-smtp.us-east-1.amazonaws.com, and port 587 is commonly used for SMTP with STARTTLS to upgrade the connection to TLS. Using port 587 allows for establishing a secure, encrypted connection as required for compliance with TLS standards.

Question 9 of 509

A threat assessment has identified a risk whereby an internal employee could exfiltrate sensitive data from production host running inside AWS (Account 1). The threat was documented as follows:

Threat description: A malicious actor could upload sensitive data from Server X by configuring credentials for an AWS account (Account 2) they control and uploading data to an Amazon S3 bucket within their control.

Server X has outbound internet access configured via a proxy server. Legitimate access to S3 is required so that the application can upload encrypted files to an

S3 bucket. Server X is currently using an IAM instance role. The proxy server is not able to inspect any of the server communication due to TLS encryption.

Which of the following options will mitigate the threat? (Choose two.)

    Correct Answer: A, B

    To mitigate the threat of data exfiltration to an unauthorized S3 bucket, it is necessary to implement controls that restrict S3 access to only the intended and authorized S3 buckets. Using an S3 VPC endpoint and configuring its policy to whitelist specific S3 buckets within the authorized AWS account ensures that Server X can only interact with permitted S3 buckets, bypassing the proxy server. Additionally, blocking outbound access to public S3 endpoints at the proxy server will prevent any attempts by the rogue employee to bypass the VPC endpoint and upload data to unauthorized S3 buckets. This combination ensures legitimate access is maintained while preventing unauthorized data exfiltration.

Question 10 of 509

A company will store sensitive documents in three Amazon S3 buckets based on a data classification scheme of `Sensitive,` `Confidential,` and `Restricted.` The security solution must meet all of the following requirements:

✑ Each object must be encrypted using a unique key.

✑ Items that are stored in the `Restricted` bucket require two-factor authentication for decryption.

✑ AWS KMS must automatically rotate encryption keys annually.

Which of the following meets these requirements?

    Correct Answer: A

    The correct approach to meet the security requirements is to create a Customer Master Key (CMK) for each data classification type and enable the automatic rotation of these keys annually. For the 'Restricted' bucket, implementing a key policy that requires multi-factor authentication (MFA) is essential. AWS Key Management Service (KMS) provides envelope encryption, meaning that while each object is encrypted with a unique data encryption key (DEK), the DEK itself is encrypted with the CMK. This ensures each object is encrypted uniquely, as required. S3 SSE-KMS encryption meets all the outlined requirements, making this the optimal choice.