AWS Certified Security – Specialty (SCS-C02)
Exam Notes & Practice Tests
11 full-length timed mock exams • Answers with explanations • All exam domains covered
Quiz Summary
0 of 65 Questions completed
Questions:
Information
You have already completed this quiz. You cannot start it again.
Quiz is loading…
You must sign in or sign up to take this quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 65 Questions answered correctly
Your Time:
Time has elapsed.
You have reached 0 of 0 point(s), (0)
Grade:
0 Essay(s) Pending (Possible Point(s): 0)
Domains
- AWS Practice 0%
-
You didn’t pass this time, but that’s okay. Take this as an opportunity to identify areas for improvement. Review the materials, focus on your weak spots, and you’ll be even more prepared for your next attempt.
-
Great work! You passed this practice test. Keep reinforcing your knowledge, and you’ll be confident and ready for the real AWS exam.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- Current
- Review
- Answered
- You're Right!
- Incorrect
-
Question 1 of 651. Question
A company needs to inspect and log traffic that passes between instances in the same subnet. They have deployed a virtual security appliance in the subnet. What configuration is required to allow the virtual security appliance to inspect and log traffic?
CorrectIncorrect -
Question 2 of 652. Question
A company is using AWS KMS to manage encryption keys for an application that stores sensitive data. The company wants to ensure that the keys are automatically rotated every 6 months. What steps should be taken to meet these requirements?
CorrectIncorrect -
Question 3 of 653. Question
A company uses AWS Security Hub and AWS Inspector to manage and monitor security events. The security team wants to receive notifications via email whenever a medium-priority finding is detected. What is the best way to set this up?
CorrectIncorrect -
Question 4 of 654. Question
A company is deploying a web application on Amazon EC2 instances within a private subnet. The application needs to be accessible from the internet, but the company wants to ensure that the backend database, hosted on RDS in the same VPC, is not accessible from the internet. What is the best way to configure the security groups and network architecture to meet these requirements?
CorrectIncorrect -
Question 5 of 655. Question
A company is concerned about potential vulnerabilities in its EC2 instances and wants to ensure compliance with security best practices. What AWS service can be used to scan the instances for known vulnerabilities and compliance with CIS benchmarks?
CorrectIncorrect -
Question 6 of 656. Question
A company replicates encrypted objects from an S3 bucket in one region to another region. However, only unencrypted objects are successfully replicating. Which actions should be taken to ensure the encrypted objects replicate successfully?
CorrectIncorrect -
Question 7 of 657. Question
A global organization wants to delegate IAM role creation to regional teams while ensuring that roles cannot be misconfigured to grant excessive permissions. What is the best approach to achieve this?
CorrectIncorrect -
Question 8 of 658. Question
A company is worried about DDoS attacks on its application hosted behind an Application Load Balancer (ALB). What steps can be taken to mitigate the impact of Layer 7 DDoS attacks?
CorrectIncorrect -
Question 9 of 659. Question
A security engineer configured an S3 bucket policy to deny access to all users except for a specific set of IAM users. What will be the effect of this policy?
CorrectIncorrect -
Question 10 of 6510. Question
A company wants to enforce security best practices after an access key was accidentally exposed. What are the first steps that should be taken to mitigate the risk?
CorrectIncorrect -
Question 11 of 6511. Question
A company needs to collect forensic data from an EC2 instance that has become unresponsive after a suspected attack. What steps should the security team take?
CorrectIncorrect -
Question 12 of 6512. Question
A security architect needs to ensure secure, encrypted connections for a web application hosted on EC2 instances behind a Network Load Balancer (NLB). What actions should be taken?
CorrectIncorrect -
Question 13 of 6513. Question
Domain: Data Protection A company needs to rotate its KMS keys annually as part of its compliance requirements. The keys were originally created using imported key material. What is the most efficient process for rotating these keys?
CorrectIncorrect -
Question 14 of 6514. Question
A company wants to centralize log data from multiple AWS accounts into a single account for real-time processing and analysis. What is the most effective solution?
CorrectIncorrect -
Question 15 of 6515. Question
An application is deployed on EC2 instances behind a Network Load Balancer (NLB), but the instances are failing health checks. What are possible reasons for this?
CorrectIncorrect -
Question 16 of 6516. Question
A company wants to ensure all configuration changes and access activities in its AWS environment are logged for audit purposes. Which combination of services should be used?
CorrectIncorrect -
Question 17 of 6517. Question
A company plans to store sensitive data in Amazon S3 and use KMS for encryption. The company’s policies require the use of custom key material with specified expiration dates. What is the best way to configure KMS to meet these requirements?
CorrectIncorrect -
Question 18 of 6518. Question
A company is hosting a web application on EC2 instances in a private subnet. The application must be accessible through an Application Load Balancer (ALB) with secure, encrypted connections. What rules should be configured in the security groups?
CorrectIncorrect -
Question 19 of 6519. Question
A company is storing sensitive customer data in an RDS database and wants to ensure the data is encrypted and the credentials are rotated automatically. What solutions should the security engineer implement?
CorrectIncorrect -
Question 20 of 6520. Question
A university using AWS Organizations needs to enforce strict control over the root user accounts across all member accounts. What steps should be taken to achieve this?
CorrectIncorrect -
Question 21 of 6521. Question
A security engineer needs to audit the creation of new AWS accounts in an organization where users authenticate through an on-premises IdP. What is the best way to determine who made the request?
CorrectIncorrect -
Question 22 of 6522. Question
A security team needs to quickly identify any EC2 instances that are running a specific vulnerable version of software. What is the most efficient way to accomplish this? A. Use AWS Systems Manager to run a compliance check on the EC2 instances. B. Set up AWS Config rules to detect non-compliant instances and trigger an alert. C. Configure Amazon Inspector to scan instances for known vulnerabilities. D. Run a custom script on each instance to check for the vulnerable software version.
CorrectIncorrect -
Question 23 of 6523. Question
A company’s security team is designing a distributed application that will operate across multiple AWS regions and on-premises servers. What are correct considerations for encryption in transit? A. Inter-region traffic is encrypted by default on the AWS global network. B. All traffic between Availability Zones is unencrypted unless configured otherwise. C. AWS Direct Connect traffic is automatically encrypted end-to-end. D. Intra-region traffic between EC2 instances is encrypted by default.
CorrectIncorrect -
Question 24 of 6524. Question
A developer has left a company, and the security team needs to ensure that the developer’s code cannot be deployed to AWS Lambda functions. What is the best solution? A. Remove the developer’s IAM permissions for accessing AWS Signer. B. Revoke the signing profile associated with the developer from all Lambda functions. C. Delete the developer’s IAM account and any associated access keys. D. Rotate the encryption keys used for Lambda functions.
CorrectIncorrect -
Question 25 of 6525. Question
A company is using IPv6 in its VPC and needs to provide EC2 instances in a private subnet with internet access for updates. How can this be securely achieved? A. Deploy an egress-only internet gateway and update the route table for the private subnet. B. Set up a NAT gateway in a public subnet and route traffic from the private subnet through it. C. Use an internet gateway in the private subnet and create a custom route table for outbound traffic. D. Enable an internet gateway in a public subnet and route IPv6 traffic from the private subnet through it.
CorrectIncorrect -
Question 26 of 6526. Question
A company has detected that the credentials for one of its AWS IAM users have been compromised. The security team needs to immediately invalidate the compromised credentials and ensure that new, secure credentials are issued and rotated automatically moving forward. Which of the following actions should the security team take to meet these requirements? (Select TWO.) A. Revoke all active sessions for the compromised IAM user using the AWS Management Console or CLI. B. Delete the IAM user and create a new IAM user with a new set of credentials. C. Rotate the compromised credentials using AWS Secrets Manager and enable automatic rotation. D. Create a new access key for the IAM user, disable the old access key, and configure automatic rotation using AWS Secrets Manager. E. Enable AWS CloudTrail to monitor the IAM user activities and automatically disable the credentials if suspicious activity is detected.
CorrectIncorrect -
Question 27 of 6527. Question
A company’s Amazon EC2 instance is suspected to be compromised. As part of the incident response process, the security team needs to isolate the instance from the rest of the network to prevent further damage. Which of the following steps should the security team take to effectively isolate the compromised instance? A. Change the instance's security group to one that denies all inbound and outbound traffic. B. Modify the Network ACL associated with the instance's subnet to block all traffic. C. Terminate the instance to ensure it no longer poses a threat. D. Move the instance to a separate VPC with no Internet Gateway or VPN connection.
CorrectIncorrect -
Question 28 of 6528. Question
Domain: Threat Detection and Incident Response A company wants to streamline its incident response process for security threats detected in its AWS environment. The security team decides to create a set of playbooks and runbooks to standardize responses to specific incidents, such as unauthorized access to S3 buckets or compromised EC2 instances. Which of the following is the MOST effective approach to achieve this? A. Create a playbook that outlines the manual steps for responding to each type of incident and ensure all security team members are trained on it. B. Develop automated runbooks using AWS Systems Manager Automation to execute predefined steps in response to detected incidents, such as isolating compromised instances or revoking access to S3 buckets. C. Use AWS CloudTrail logs to manually investigate security incidents and update playbooks as new threats are discovered. D. Implement AWS Config rules to automatically remediate security incidents without the need for predefined playbooks or runbooks.
CorrectIncorrect -
Question 29 of 6529. Question
Which AWS service provides a comprehensive view of your security alerts across multiple AWS services and helps to prioritize security findings? A. AWS Identity and Access Management (IAM) Access Analyzer B. Amazon GuardDuty C. AWS Security Hub D. Amazon Detective
CorrectIncorrect -
Question 30 of 6530. Question
When configuring Amazon EventBridge to handle security findings from AWS Security Hub, which service or format is primarily used to standardize and centralize these findings? A. Amazon SNS (Simple Notification Service) B. ASFF (AWS Security Finding Format) C. Amazon S3 D. AWS Config
CorrectIncorrect -
Question 31 of 6531. Question
Your organization uses AWS Macie to monitor S3 buckets for sensitive data. Macie has generated a finding indicating the presence of PII in a publicly accessible S3 bucket. What should be your immediate action? A. Modify the bucket policy to restrict public access. B. Delete the S3 bucket to eliminate the risk. C. Enable default encryption for the S3 bucket. D. Create a CloudWatch alarm to monitor further public access.
CorrectIncorrect -
Question 32 of 6532. Question
Which AWS service is best suited for investigating, analyzing, and visualizing security issues detected across multiple AWS accounts? A. AWS CloudTrail B. Amazon Detective C. Amazon GuardDuty D. AWS Security Hub
CorrectIncorrect -
Question 33 of 6533. Question
A security engineer needs to validate suspicious API activities recorded in AWS CloudTrail logs. Which Amazon Athena SQL query should be used to identify all DeleteBucket operations performed by a specific IAM user within the last 24 hours? A. 1. SELECT * FROM cloudtrail_logs 2. WHERE eventName = 'DeleteBucket' 3. AND userIdentity.userName = 'specific-user' 4. AND eventTime > current_timestamp – interval '1' day; B. 1. SELECT * FROM cloudtrail_logs 2. WHERE requestParameters.bucketName = 'DeleteBucket' 3. AND userIdentity.userName = 'specific-user' 4. AND eventTime > current_timestamp – interval '1' day; C. 1. SELECT * FROM cloudtrail_logs 2. WHERE eventName = 'DeleteBucket' 3. AND userIdentity.sessionContext.sessionIssuer.userName = 'specific-user' 4. AND eventTime > current_date – interval '24' hour; D. 1. SELECT * FROM cloudtrail_logs 2. WHERE eventSource = 's3.amazonaws.com' 3. AND eventName = 'DeleteBucket' 4. AND userIdentity.principalId = 'specific-user' 5. AND eventTime > current_date – interval '1' day;
CorrectIncorrect -
Question 34 of 6534. Question
A security engineer suspects that an Amazon EC2 instance in their VPC has been compromised. What is the quickest way to isolate this instance to prevent further damage while maintaining the ability to investigate? A. Terminate the instance immediately. B. Stop the instance to prevent further activity. C. Modify the security group associated with the instance to deny all inbound and outbound traffic. D. Move the instance to a private subnet with no internet access.
CorrectIncorrect -
Question 35 of 6535. Question
When investigating a compromised Amazon EC2 instance, which AWS service allows you to capture a complete memory dump for forensic analysis? A. AWS Systems Manager B. AWS CloudTrail C. AWS Elastic Beanstalk D. EC2Rescue
CorrectIncorrect -
Question 36 of 6536. Question
Domain: Security Logging and Monitoring A custom application running on an Amazon EC2 instance is designed to send operational metrics to Amazon CloudWatch. However, the application is not reporting any statistics as expected. What could be the possible cause of this issue? A. The CloudWatch Logs agent is not installed on the EC2 instance. B. The IAM role attached to the EC2 instance lacks the cloudwatch:PutMetricData permission. C. The CloudWatch alarm associated with the application is not configured properly. D. The EC2 instance is not in the same region as the CloudWatch service.
CorrectIncorrect -
Question 37 of 6537. Question
Domain: Security Logging and Monitoring A financial services company needs to monitor AWS services for any unauthorized API calls or changes to critical resources. The monitoring solution must comply with stringent regulatory requirements for audit trails. Which AWS service should the company use to meet these security and compliance requirements? A. AWS CloudTrail B. Amazon CloudWatch C. AWS GuardDuty D. Amazon Macie
CorrectIncorrect -
Question 38 of 6538. Question
A security engineer needs to configure logging for an Amazon S3 bucket to capture and monitor access requests to the bucket, including requests that are denied due to permissions. Which actions should the security engineer take to enable and access the logs? (Select TWO.) A. Enable server access logging for the S3 bucket. B. Enable AWS CloudTrail Data Events for the S3 bucket. C. Configure Amazon S3 Inventory to track object-level activities. D. Use Amazon Athena to query the CloudTrail logs for S3 access. E. Enable VPC Flow Logs for the VPC containing the S3 bucket.
CorrectIncorrect -
Question 39 of 6539. Question
An organization needs to ensure that its log data is retained for 7 years to comply with regulatory requirements. The log data is stored in Amazon S3. What should the organization do to implement this retention policy? A. Use Amazon S3 Lifecycle policies to transition objects to Glacier after 7 years. B. Use Amazon S3 Lifecycle policies to delete objects automatically after 7 years. C. Enable versioning on the S3 bucket and configure a lifecycle policy to retain logs. D. Move the logs to Amazon Glacier Deep Archive after 7 years for long-term storage.
CorrectIncorrect -
Question 40 of 6540. Question
A security engineer is setting up log ingestion for a new AWS environment. The engineer needs to ensure that logs from Amazon EC2 instances, Amazon S3, and Amazon RDS are captured and centralized for analysis. Which AWS services should the engineer configure to meet this requirement? (Select TWO.) A. Amazon CloudWatch Logs for EC2 instance logs B. AWS CloudTrail Data Events for S3 access logs C. Amazon RDS Enhanced Monitoring for capturing database logs D. AWS Config for tracking changes in resources E. AWS X-Ray for tracing requests across services
CorrectIncorrect -
Question 41 of 6541. Question
A security analyst notices that logs from an important application are missing from the centralized logging system. The application runs on Amazon EC2 instances, and the logs were previously being ingested into Amazon CloudWatch Logs. What should the analyst check first to determine the cause of the missing logs? A. Verify that the CloudWatch Logs agent is running on the EC2 instances. B. Ensure that the EC2 instances have network connectivity to the CloudWatch Logs endpoint. C. Check the CloudWatch Logs quota to ensure that it has not been exceeded. D. Review the IAM role associated with the EC2 instances to verify that it has the correct permissions for CloudWatch Logs.
CorrectIncorrect -
Question 42 of 6542. Question
A security team is tasked with identifying suspicious activity by analyzing logs from various AWS services, including Amazon S3, AWS Lambda, and AWS CloudTrail. The team needs to correlate logs from these services to detect patterns indicative of potential threats. Which AWS service should the team use to normalize, parse, and correlate these logs? A. Amazon Athena B. AWS Security Hub C. Amazon Macie D. AWS Lambda
CorrectIncorrect -
Question 43 of 6543. Question
A company is deploying a new web application on AWS, which includes an Amazon EC2 instance, an RDS database, and an Application Load Balancer (ALB). The security team needs to identify and monitor security-related events across all these components. Which combination of AWS services should the security team use to collect and monitor logs from all components? A. AWS CloudTrail for API activity, Amazon CloudWatch Logs for EC2 logs, and AWS Config for configuration changes B. AWS GuardDuty for threat detection, AWS Config for configuration changes, and Amazon Inspector for vulnerability assessments C. AWS CloudTrail for API activity, AWS X-Ray for request tracing, and Amazon CloudWatch for custom metrics D. AWS CloudTrail for API activity, AWS Config for configuration changes, and AWS Systems Manager for patch compliance
CorrectIncorrect -
Question 44 of 6544. Question
A security engineer needs to configure the storage and lifecycle management of logs according to AWS best practices. What is the recommended solution for managing long-term log storage while optimizing cost? A. Store logs in Amazon S3 with Intelligent-Tiering enabled and set lifecycle policies for transition to Glacier B. Store logs in Amazon RDS with automated snapshots enabled C. Store logs in AWS CloudWatch Logs with perpetual retention D. Store logs in Amazon DynamoDB with global tables enabled
CorrectIncorrect -
Question 45 of 6545. Question
A company has deployed a public-facing website on AWS using Amazon CloudFront as a Content Delivery Network (CDN) and Amazon S3 to host static assets. The company is concerned about potential threats like DDoS attacks and injection vulnerabilities. Which combination of AWS services should the security engineer use to enhance the edge security of the website? A. AWS WAF to protect against SQL injection and XSS attacks, and AWS Shield Standard to mitigate DDoS attacks. B. AWS Config to monitor configuration changes and AWS GuardDuty for threat detection. C. AWS Certificate Manager (ACM) for SSL/TLS certificates and Amazon Macie for sensitive data discovery. D. Amazon Inspector to assess vulnerabilities and AWS Secrets Manager to manage sensitive information.
CorrectIncorrect -
Question 46 of 6546. Question
A mobile application backend is hosted on AWS using serverless architecture, including Amazon API Gateway and AWS Lambda. The application is experiencing an increase in API request volumes, potentially indicating a DDoS attack. What edge security strategies should the security engineer implement to protect the application? A. Enable AWS Shield Advanced for API Gateway and configure rate-based rules in AWS WAF to block malicious requests. B. Use Amazon CloudFront to cache API responses and AWS Macie to detect sensitive data. C. Deploy AWS Systems Manager to automate the blocking of IP addresses and Amazon Inspector for vulnerability scanning. D. Implement AWS Key Management Service (KMS) to encrypt API requests and AWS Config for configuration management.
CorrectIncorrect -
Question 47 of 6547. Question
A company is configuring an application that needs to access AWS resources in another account temporarily. The application requires short-lived access credentials for this purpose. Which service should the company use to issue these credentials? A. AWS Identity and Access Management (IAM) B. AWS Security Token Service (AWS STS) C. AWS Directory Service D. AWS Single Sign-On (SSO)
CorrectIncorrect -
Question 48 of 6548. Question
Domain: Identity and Access Management A security engineer needs to enforce multi-factor authentication (MFA) for users accessing sensitive data in an Amazon S3 bucket. The users already have permissions to access the bucket. What is the best approach to enforce MFA for this access? A. Update the IAM policy attached to the users to require MFA for the S3 actions. B. Create an S3 bucket policy that denies access unless MFA is used. C. Enable MFA on the root account. D. Attach a service control policy (SCP) requiring MFA to the organizational unit (OU) containing the users.
CorrectIncorrect -
Question 49 of 6549. Question
An organization uses attribute-based access control (ABAC) to manage permissions for its users. The company wants to ensure that employees only have access to resources tagged with their department name. Which IAM policy condition key should be used to enforce this requirement? A. aws:PrincipalTag B. aws:RequestTag C. aws:ResourceTag D. aws:RequestRegion
CorrectIncorrect -
Question 50 of 6550. Question
A security engineer is reviewing an IAM policy that allows a user to perform actions on an Amazon S3 bucket but denies actions if the request is not from a specific IP range. What will be the effect of this policy? A. The user can access the S3 bucket only from the specified IP range. B. The user can access the S3 bucket from any IP address. C. The user cannot access the S3 bucket at all. D. The policy will be ignored, and the default allow behavior will apply.
CorrectIncorrect -
Question 51 of 6551. Question
A developer is troubleshooting a Lambda function that cannot access an Amazon DynamoDB table. The IAM role attached to the function has the necessary permissions. What should the developer check next? A. Whether the IAM policy is attached to the correct role. B. Whether the IAM role has an explicit deny statement for DynamoDB. C. Whether the DynamoDB table’s resource policy allows access to the role. D. Whether the Lambda function’s VPC configuration is correct.
CorrectIncorrect -
Question 52 of 6552. Question
A company needs to enforce the principle of least privilege for its IAM users. The security team discovered that some users have permissions that are not necessary for their roles. What is the best approach to address this issue? A. Use IAM Access Analyzer to identify and remove unnecessary permissions. B. Manually review each user’s permissions and adjust as needed. C. Enable service control policies (SCPs) to limit permissions across the organization. D. Require multi-factor authentication (MFA) for all actions performed by users.
CorrectIncorrect -
Question 53 of 6553. Question
A company has implemented role-based access control (RBAC) for its AWS environment. A new project requires specific access to a subset of resources by users from different roles. How should the company grant these permissions while maintaining the principle of least privilege? A. Create a new IAM role with the necessary permissions and assign it to the users. B. Modify the existing IAM roles to include the new permissions. C. Use resource-based policies to grant access to the specific resources. D. Use service control policies (SCPs) to enforce the new permissions.
CorrectIncorrect -
Question 54 of 6554. Question
A company needs to establish secure connectivity between their on-premises data center and AWS using Direct Connect. They want to ensure that all traffic is encrypted while traversing the connection. Which approach should the company take? A. Use AWS Direct Connect with a private VIF and enable encryption using an AWS Site-to-Site VPN over Direct Connect. B. Use AWS Direct Connect with a public VIF and enable SSL/TLS encryption for application-level traffic. C. Use AWS Direct Connect with a private VIF and rely on AWS Shield for encryption. D. Use AWS Direct Connect with a public VIF and configure encryption in the Direct Connect settings.
CorrectIncorrect -
Question 55 of 6555. Question
A company wants to ensure that all connections to their Amazon S3 buckets require encryption. How can the company enforce this requirement? A. Apply a bucket policy that requires the use of the x-amz-server-side-encryption header for all PUT requests. B. Enable default encryption on the S3 bucket using AWS KMS keys. C. Configure a VPC endpoint for S3 and require all connections to use HTTPS. D. Use AWS WAF to block any non-encrypted requests to the S3 bucket.
CorrectIncorrect -
Question 56 of 6556. Question
Your organization is setting up an Amazon RDS instance for a critical application. The security team requires that all connections to the RDS instance be encrypted. What should you do to meet this requirement? A. Enable encryption in the RDS settings and configure the application to use SSL/TLS for connections. B. Set up a VPN between the application server and the RDS instance to ensure encrypted traffic. C. Use IAM roles to enforce encrypted connections to the RDS instance. D. Apply an S3 bucket policy to enforce encryption when accessing the RDS instance.
CorrectIncorrect -
Question 57 of 6557. Question
A company is designing a cross-Region networking solution using AWS Direct Connect. They want to ensure that traffic between Regions is secure and does not traverse the public internet. What solution should they implement? A. Use AWS Direct Connect with private VIFs in each Region and configure VPNs over Direct Connect for encryption. B. Use AWS Direct Connect with public VIFs and enable AWS Shield for secure connections. C. Use AWS Direct Connect Gateway to route traffic between private VIFs in different Regions. D. Use AWS Global Accelerator to route traffic securely between Regions over the public internet.
CorrectIncorrect -
Question 58 of 6558. Question
A company needs to establish a secure, cross-Region connection between its AWS environments in the US East (N. Virginia) and Europe (Frankfurt) Regions. The company wants to ensure that traffic does not traverse the public internet. Which configuration should the company implement? A. Set up a VPN over AWS Direct Connect with private VIFs in both Regions and route traffic through a Direct Connect Gateway. B. Use a public VIF on AWS Direct Connect in both Regions to ensure traffic does not traverse the public internet. C. Configure VPC peering between the VPCs in both Regions to route traffic securely. D. Use AWS Transit Gateway with VPC attachments in both Regions and enable AWS Global Accelerator for secure routing.
CorrectIncorrect -
Question 59 of 6559. Question
A company is planning to implement AWS Control Tower to manage its multi-account environment. Which prerequisite must be considered before deployment? A. Deactivate AWS Config across all existing accounts B. Ensure AWS Organizations is enabled with all features C. Disable Amazon CloudWatch Logs in all existing accounts D. Remove all existing Service Control Policies (SCPs) from the organization
CorrectIncorrect -
Question 60 of 6560. Question
An organization wants to enforce strict limitations on the use of root accounts across its AWS accounts. Which strategy should the organization implement using AWS Organizations? A. Apply an SCP that denies all actions except billing for root users B. Enable AWS CloudTrail to log all actions performed by the root account C. Use IAM policies to restrict root account access D. Set up AWS Config to monitor root account activities and alert when used
CorrectIncorrect -
Question 61 of 6561. Question
An organization needs to securely share resources like Amazon S3 buckets and Amazon RDS instances across multiple AWS accounts. Which service provides a solution for securely sharing resources? A. AWS Resource Access Manager (RAM) B. AWS Control Tower C. AWS Organizations D. AWS Service Catalog
CorrectIncorrect -
Question 62 of 6562. Question
A security engineer needs to enforce a centralized security policy across multiple AWS accounts to manage network firewalls. Which service should they deploy to achieve this? A. AWS Firewall Manager B. AWS Security Hub C. AWS Control Tower D. AWS Config
CorrectIncorrect -
Question 63 of 6563. Question
A company needs to deploy a consistent and secure cloud environment across multiple AWS accounts, ensuring only approved services are available for use. Which service should be used to create and manage portfolios of approved services? A. AWS Service Catalog B. AWS Control Tower C. AWS Resource Access Manager (RAM) D. AWS Firewall Manager
CorrectIncorrect -
Question 64 of 6564. Question
A security team is tasked with ensuring that all AWS accounts in an organization are consistently managed and that security configurations are centralized. What AWS service should be used to aggregate findings and manage security configurations across accounts? A. AWS Control Tower B. AWS Config aggregators C. AWS Resource Access Manager (RAM) D. AWS Service Catalog
CorrectIncorrect -
Question 65 of 6565. Question
Your company has multiple AWS accounts and wants to enforce a tagging strategy across all resources. What method can be used to ensure compliance with the tagging strategy? A. Implement an SCP that denies resource creation without proper tags B. Use AWS Config to create rules that evaluate resource tags across accounts C. Apply a CloudFormation template that enforces tagging on all resources D. Utilize AWS Service Catalog to enforce tagging during resource provisioning
CorrectIncorrect
Course Duration
Notes: 1h 38m | Quiz: 31h 10m | Total: 32h 48mWhat you get
11 Full-Length Practice Exams
Realistic, exam-style practice tests designed to reflect the format, difficulty, and depth of the AWS Certified Security – Specialty exam.
Scenario-Based Security Questionss
Practice with questions that reinforce AWS security decision-making across identity, data protection, logging, infrastructure security, and incident response.
Exam Notes Across All Domains
Clear, well-organized notes mapped to all SCS-C02 domains to streamline preparation and reduce guesswork.
Answer Explanations
Concise, exam-focused explanations that help you understand why the correct option is correct—and why the others are not.
What you’ll be able to do after this
FAQ
Is this aligned to the SCS-C02 exam?
Yes. The notes and practice tests are structured around the SCS-C02 exam domains and focus on the security skills tested on the exam.
Are the practice exams timed?
The full-length mock exams are designed for real pacing and exam simulation.
How do I enroll with the coupon link?
If you arrived via a coupon URL, the offer should be applied automatically as you proceed to checkout.
How long do I get access?
Once you successfully enroll, you will receive two years of course access.
What is your refund policy?
KnoDAX offers a 14-day refund policy from the date of purchase. Refunds are available provided the course has not been substantially consumed. Due to the digital nature of our content, refunds may not be issued once a significant portion of videos, notes, or practice exams has been accessed.
Course Content
This course—including videos, audio, slides, code samples, demonstrations, and downloadable materials—is proprietary educational content provided by KnoDAX.
The course is intended solely for educational and informational purposes and does not constitute legal, financial, medical, or professional advice of any kind. While every effort has been made to ensure accuracy and completeness, KnoDAX makes no representations or warranties, express or implied, regarding the accuracy or completeness of the content. KnoDAX shall not be held liable for any errors, omissions, or outcomes arising from the use of this course. Learners are encouraged to exercise independent judgment and seek professional guidance where appropriate.
Learners may not reproduce, record, share, redistribute, or resell any part of this course, in whole or in part, without prior written permission from KnoDAX.
This practice test is an independent educational resource and is not affiliated with, endorsed by, or sponsored by any certification provider.
Practice test scores are indicative only and do not guarantee success on any certification exam.
This course is for educational purposes only. Content may be updated, revised, or removed to reflect the latest information. Access is subject to the Terms of Use.
Ratings and Reviews
