AWS Certified Security - Specialty - (SCS-C02) Logo
Amazon Logo

AWS Certified Security - Specialty - (SCS-C02) Exam Questions

280

Total Questions

SEP
2025

Last Updated

1st

1st Try Guaranteed

Expert Verified

Experts Verified

Question 11 Single Choice

A user is trying to upload a large file to an Amazon S3 bucket present in a given AWS account. In the upload request, the user is passing the encryption information using an AWS Key Management Service (AWS KMS) key, also present in the same account. However, the user is getting an Access Denied error. Meanwhile, when the user uploads a smaller file with encryption information, the upload succeeds.

As a Security Engineer, how will you fix this issue?

Question 12 Single Choice

A company has meticulously strengthened its AWS Cloud security solution to detect and respond to the organization’s security requirements by using AWS Firewall Manager, Amazon Inspector, and AWS Shield Advanced services in its AWS accounts. The company has recently added the Amazon Macie data security service to discover and help protect sensitive data. The company wants to implement a solution (using data from these security services) that can initiate alerts if a DDoS attack happens on the company's AWS resources.

Which solution will implement this requirement?

Question 13 Multiple Choice

An AWS root user has logged in to the AWS account and realized that there is no access to an Amazon S3 bucket under the given AWS account.

What is the reason for this behavior and how will you fix the issue? (Select two)

Question 14 Single Choice

An AWS service present in AWS Account 1 is exposed to AWS Account 2 using VPC private link. The Network Load Balancer (NLB) in Account 1 is configured and has accepted the connection. While data is seen leaving from the NLB, the client side is not getting the transmitted data.

What steps should be undertaken to troubleshoot this issue?

Question 15 Multiple Choice

A Network Load Balancer (NLB) was recently set up in a company's AWS infrastructure, but the target instances are not entering the InService state. The security engineer was called upon to investigate the issue. After conducting a thorough investigation, the engineer determined that the health checks were failing.

Which of the following could cause the health checks to fail? (Select three)

Question 16 Single Choice

A company wants to secure the objects in S3 using server-side encryption, subject to the constraint that the key material must be generated and stored in a certified FIPS 140-2 Level 3 hardware service modules (HSM) that the company manages itself. In addition, the key material must be available in multiple Regions. The size of objects in S3 ranges from 15 KB to 5 MB.

As an AWS Certified Security Specialist, which of the following would you recommend?

Question 17 Single Choice

The security team at a company needs to follow the security requirements:

  • Monitor all traffic leaving a particular VPC
  • Monitor all traffic whose source is outside of the VPC

The purpose of this traffic monitoring is to put in place a proper content inspection, troubleshooting, and threat monitoring solution.

Which of the following options represents the best solution for the given requirement?

Question 18 Single Choice

A Security Engineer has been asked to create an identity-based policy that allows access to add objects to an Amazon S3 bucket. But, the access should be given from April 1, 2023, through April 30, 2023 (UTC) inclusive.

How will you define this identity-based policy?

Question 19 Multiple Choice

A company has recently set up AWS Organizations to get all its AWS accounts under one organization to standardize the monitoring and compliance needs of the company. The company has the following requirements:

a) All user actions have to be logged. b) Based on the company's security needs, define alarms that respond to specific user actions. c) Send real-time alerts for the alarms raised.

Which of the following options can be combined to create an optimal solution for the given requirements? (Select two)

Question 20 Multiple Choice

A hybrid AWS network is configured to route internet traffic such that it egresses from an on-premises gateway rather than from a VPC Internet Gateway (IGW). Since enabling Amazon GuardDuty, an error has been repeatedly seen in the GuardDuty findings: UnauthorizedAccess:IAMUser/InstanceCredentialExfiltration.OutsideAWS. This finding informs you that a host outside of AWS has attempted to run AWS API operations using temporary AWS credentials that were created on an EC2 instance in your AWS environment. The listed EC2 instance might be compromised, and the temporary credentials from this instance might have been exfiltrated to a remote host outside of AWS.

As a Security engineer, what steps would you take to address this issue, so that the VPC's internet traffic that egresses from an on-premises gateway does not trigger the given error? (Select two)

Page: 2 / 28