exam questions

Exam AWS Certified Security - Specialty SCS-C02 All Questions

View all questions & answers for the AWS Certified Security - Specialty SCS-C02 exam

Exam AWS Certified Security - Specialty SCS-C02 topic 1 question 159 discussion

A development team is creating an open source toolset to manage a company's software as a service (SaaS) application. The company stores the code in a public repository so that anyone can view and download the toolset's code.

The company discovers that the code contains an IAM access key and secret key that provide access to internal resources in the company’s AWS environment

A security engineer must implement a solution to identify whether unauthorized usage of the exposed credentials has occurred. The solution also must prevent any additional usage of the exposed credentials.

Which combination of steps will meet these requirements? (Choose two.)

  • A. Use AWS Identity and Access Management Access Analyzer to determine which resources the exposed credentials accessed and who used them.
  • B. Deactivate the exposed IAM access key from the user’s IAM account.
  • C. Create a rule in Amazon GuardDuty to block the access key in the source code from being used.
  • D. Create a new IAM access key and secret key for the user whose credentials were exposed.
  • E. Generate an IAM credential report. Check the report to determine when the user that owns the access key last logged in.
Show Suggested Answer Hide Answer
Suggested Answer: AB 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
f3f9bfe
Highly Voted 6 months, 4 weeks ago
Selected Answer: AB
Security Engineer must identified whether unauthorized usage of the exposed credential has occurred and prevent any additional usage of the exposed credential. The Answers are A and B
upvoted 8 times
...
7c84836
Most Recent 4 months, 2 weeks ago
why A over E?
upvoted 1 times
lovekiller
1 month, 3 weeks ago
IAM credential report provides information about the status of IAM users and their credentials, but it does not provide detailed insights into which resources were accessed using the exposed credentials.
upvoted 1 times
...
...
sema2232
5 months, 3 weeks ago
B, E correct
upvoted 3 times
...
aescudero51
5 months, 4 weeks ago
Selected Answer: AB
My answer is A & B A. Use AWS Identity and Access Management Access Analyzer to determine which resources the exposed credentials accessed and who used them. This will help identify if any unauthorized activity occurred while the credentials were exposed. B. Deactivate the exposed IAM access key from the user's IAM account. This will immediately prevent any further use of the compromised credentials.
upvoted 1 times
...
Zek
6 months, 3 weeks ago
A, B look Ok to me
upvoted 2 times
...
danish1234
6 months, 3 weeks ago
A and E
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago