exam questions

Exam AWS Certified DevOps Engineer - Professional DOP-C02 All Questions

View all questions & answers for the AWS Certified DevOps Engineer - Professional DOP-C02 exam

Exam AWS Certified DevOps Engineer - Professional DOP-C02 topic 1 question 102 discussion

A company runs applications in AWS accounts that are in an organization in AWS Organizations. The applications use Amazon EC2 instances and Amazon S3.

The company wants to detect potentially compromised EC2 instances, suspicious network activity, and unusual API activity in its existing AWS accounts and in any AWS accounts that the company creates in the future. When the company detects one of these events, the company wants to use an existing Amazon Simple Notification Service (Amazon SNS) topic to send a notification to its operational support team for investigation and remediation.

Which solution will meet these requirements in accordance with AWS best practices?

  • A. In the organization’s management account, configure an AWS account as the Amazon GuardDuty administrator account. In the GuardDuty administrator account, add the company’s existing AWS accounts to GuardDuty as members. In the GuardDuty administrator account, create an Amazon EventBridge rule with an event pattern to match GuardDuty events and to forward matching events to the SNS topic.
  • B. In the organization’s management account, configure Amazon GuardDuty to add newly created AWS accounts by invitation and to send invitations to the existing AWS accounts. Create an AWS CloudFormation stack set that accepts the GuardDuty invitation and creates an Amazon EventBridge rule. Configure the rule with an event pattern to match GuardDuty events and to forward matching events to the SNS topic. Configure the CloudFormation stack set to deploy into all AWS accounts in the organization.
  • C. In the organization’s management account, create an AWS CloudTrail organization trail. Activate the organization trail in all AWS accounts in the organization. Create an SCP that enables VPC Flow Logs in each account in the organization. Configure AWS Security Hub for the organization. Create an Amazon EventBridge rule with an event pattern to match Security Hub events and to forward matching events to the SNS topic.
  • D. In the organization’s management account, configure an AWS account as the AWS CloudTrail administrator account. In the CloudTrail administrator account, create a CloudTrail organization trail. Add the company’s existing AWS accounts to the organization trail. Create an SCP that enables VPC Flow Logs in each account in the organization. Configure AWS Security Hub for the organization. Create an Amazon EventBridge rule with an event pattern to match Security Hub events and to forward matching events to the SNS topic.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Just_Ninja
Highly Voted 1 year, 9 months ago
Selected Answer: A
Dear Admin, Please Fix the Wrong response here! It´s A: This solution meets all the requirements: Detect potentially compromised EC2 instances, suspicious network activity, and unusual API activity: Amazon GuardDuty is a threat detection service that continuously monitors for malicious or unauthorized behavior. It analyzes events from AWS CloudTrail, Amazon VPC Flow Logs, and DNS logs to detect such activities. Send a notification to the operational support team: Creating an Amazon EventBridge rule that matches GuardDuty findings and then forwarding these to an SNS topic allows for the generation of notifications whenever suspicious activity is detected. Cover future AWS accounts: By designating a GuardDuty administrator account in AWS Organizations, you can manage GuardDuty across all of your existing and future AWS accounts. This ensures that any new account created under the organization is automatically covered by GuardDuty.
upvoted 13 times
...
Mrflip
Most Recent 3 months, 2 weeks ago
Selected Answer: B
B is the right answer
upvoted 1 times
...
jamesf
8 months, 3 weeks ago
Selected Answer: A
keywords: compromised EC2 instances, suspicious network activity, and unusual API activity = GuardDuty
upvoted 2 times
...
zijo
10 months, 2 weeks ago
Selected Answer: A
When you use GuardDuty with an AWS organization, the management account of that organization can designate any account within the organization as the delegated GuardDuty administrator account. For this administrator account, GuardDuty gets enabled automatically only in the designated AWS Region. This account also has the permission to enable and manage GuardDuty for all of the accounts in the organization within that Region. The administrator account can view the members of and add members to this AWS organization. AWS GuardDuty can detect unusual API activity within existing AWS accounts in an AWS Organization. It monitors AWS CloudTrail event logs, which include records of all API calls made within your AWS environment. GuardDuty analyzes these logs to identify unusual or suspicious API activity that might indicate a potential security threat.
upvoted 2 times
...
zijo
10 months, 2 weeks ago
A looks like a better choice. When you use GuardDuty with an AWS organization, the management account of that organization can designate any account within the organization as the delegated GuardDuty administrator account. For this administrator account, GuardDuty gets enabled automatically only in the designated AWS Region. This account also has the permission to enable and manage GuardDuty for all of the accounts in the organization within that Region. The administrator account can view the members of and add members to this AWS organization.
upvoted 1 times
...
dkp
1 year ago
Selected Answer: A
answer A
upvoted 2 times
...
Mordans
1 year ago
If GuardDuty is indeed set up at the organization level (which is supported and encouraged by AWS for simplicity and coverage), then Option A becomes a very strong choice. It provides centralized management and automatic, seamless inclusion of all organization accounts in security monitoring without requiring manual intervention for each new account.
upvoted 1 times
...
stoy123
1 year, 1 month ago
Selected Answer: B
Definitely B
upvoted 1 times
...
thanhnv142
1 year, 2 months ago
Selected Answer: A
A is correct: <detect potentially compromised EC2 instances, suspicious network activity, and unusual API activity> means AWS GuardDuty B: dont have to invite other accounts because all accounts are in an org in AWS org. C and D: no mention of GuardDuty
upvoted 3 times
...
a54b16f
1 year, 3 months ago
Selected Answer: A
invitation is used to handle users OUTSIDE the organization.
upvoted 3 times
...
davdan99
1 year, 3 months ago
Selected Answer: A
Go For A. https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_organizations.html
upvoted 2 times
...
saysamsuf
1 year, 5 months ago
Selected Answer: B
Member accounts must accept invite from the designated guard duty account before its effect. I use AWS organisation at work and quite familiar with the workings. I lean towards B
upvoted 2 times
...
2pk
1 year, 5 months ago
It true it's missing auto enabled on. but Invitation is organization is not needed as Organization get precedence with account management when you have deligated Guardduty account. "If you have already set up a GuardDuty administrator account with associated member accounts by invitation and the member accounts are part of the same organization, their Type changes from By Invitation to Via Organizations" https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_organizations.html
upvoted 1 times
...
lakescix
1 year, 8 months ago
B is the correct answer. A could better if not for the fact that it doesn't handle automatic enablement on new AWS account. B handles this case with CloudFormation stacksets : https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-guardduty-master.html
upvoted 2 times
lunt
1 year, 8 months ago
A= does handle automatic enablement. If the GD delegated account is setup properly with automatic enablement check box ticked. As soon as the AWS account is created, GD auto enablement kicks into gear. B = How does CFN accept the GD invite? New AWS Account. CFN runs on new account > accept GD invite...but when was this invite sent? I have to login to AWS Console > GD > create invite vs A = no invite = directly enabled for GB in new account. https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_organizations.html
upvoted 2 times
...
...
lunt
1 year, 8 months ago
Selected Answer: A
B is wrong. Newly created AWS accounts = you don't need to do this if the GD Orgz is configured properly, you can accept from delegated admin account. The point remains, you can add the accounts using option A. The misdirect here is that A does not state anything about new accounts vs B which does. Bearing in mind A + B still have to do something in GD, A is actually the better option. A is right.
upvoted 3 times
...
jason7
1 year, 8 months ago
Selected Answer: B
Option A is not the best choice because although it correctly configures GuardDuty as the administrator, it does not handle the automatic addition of new AWS accounts to GuardDuty and the forwarding of events to the SNS topic
upvoted 1 times
...
jason7
1 year, 8 months ago
Option B is the most suitable solution as it combines GuardDuty, AWS CloudFormation StackSets, and Amazon EventBridge to automatically monitor all existing and future AWS accounts and send notifications to the specified SNS topic when security events are detected.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago