A company recently had a security audit in which the auditors identified multiple potential threats. These
potential threats can cause usage pattern changes such as DNS access peak, abnormal instance traffic,
abnormal network interface traffic, and unusual Amazon S3 API calls. The threats can come from different
sources and can occur at any time. The company needs to implement a solution to continuously monitor its
system and identify all these incoming threats in near-real time.
Which solution will meet these requirements?
A company uses AWS Organizations and has production workloads across multiple AWS accounts. A security
engineer needs to design a solution that will proactively monitor for suspicious behavior across all the
accounts that contain production workloads.
The solution must automate remediation of incidents across the production accounts. The solution also must
publish a notification to an Amazon Simple Notification Service (Amazon SNS) topic when a critical security
finding is detected. In addition, the solution must send all security incident logs to a dedicated account.
Which solution will meet these requirements?
A company deployed an Amazon EC2 instance to a VPC on AWS. A recent alert indicates that the EC2
instance is receiving a suspicious number of requests over an open TCP port from an external source. The TCP
port remains open for long periods of time.
The company's security team needs to stop all activity to this port from the external source to ensure that the
EC2 instance is not being compromised. The application must remain available to other users. Which solution will mefet these requirements?
A security engineer wants to forward custom application-security logs from an Amazon EC2 instance to
Amazon CloudWatch. The security engineer installs
the CloudWatch agent on the EC2 instance and adds the path of the logs to the CloudWatch configuration file.
However, CloudWatch does not receive the logs. The security engineer verifies that the awslogs service is
running on the EC2 instance. What should the security engineer do next to resolve the issue?
A company uses infrastructure as code (IaC) to create AWS infrastructure. The company writes the code as
AWS CloudFormation templates to deploy the infrastructure. The company has an existing CI/CD pipeline
that the company can use to deploy these templates.
After a recent security audit, the company decides to adopt a policy-as-code approach to improve the
company's security posture on AWS. The company must prevent the deployment of any infrastructure that
would violate a security policy, such as an unencrypted Amazon Elastic Block Store (Amazon EBS) volume.
Which solution will meet these requirements?
© Copyrights FreePDFQuestions 2025. All Rights Reserved
We use cookies to ensure that we give you the best experience on our website (FreePDFQuestions). If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the FreePDFQuestions.