1. Right Answer: B
Explanation: Option A ,B and D are all invalid because the metadata will not be encrypted in any case and this is a key requirement from the question. One key thing to note is that when the S3 bucket objects are encrypted , the meta data is not encrypted. So the best option is to use an encrypted DynamoDB table Option A ,B and C are all invalid because the metadata will not be encrypted in any case and this is a key requirement from the question. For more information on using KMS encryption for S3, please refer to below URL https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingKMSEncryption.html
2. Right Answer: B
Explanation: The AWS(Amazon Web Service) Documentation mentions the following Data key caching stores data keys and related cryptographic material in a cache. When you encrypt or decrypt data, the AWS(Amazon Web Service) Encryption SDK looks for a matching data key in the cache. If it finds a match, it uses the cached data key rather than generating a new one. Data key caching can improve performance, reduce cost, and help you stay within service limits as your application scales. Option A,C and D are all incorrect since these options will not impact how the key is used. For more information on data key caching, please refer to below URL https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/data-key-caching.html
3. Right Answer: D
Explanation:
4. Right Answer: A,B,C
Explanation: For ensuring that the instances are configured properly you need to ensure the following 1) You installed the latest version of the SSM Agent on your instance 2) Your instance is configured with an AWS(Amazon Web Service) Identity and Access Management (IAM) role that enables the instance to communicate with the Systems Manager API 3) You can use the Amazon EC2 Health API to quickly determine the following information about Amazon EC2 instances The status of one or more instances The last time the instance sent a heartbeat value The version of the SSM Agent The operating system The version of the EC2Config service (Windows) The status of the EC2Config service (Windows) Option B is invalid because IAM users are not supposed to be directly granted permissions to EC2 Instances For more information on troubleshooting AWS(Amazon Web Service) SSM, please visit the following url https://docs.aws.amazon.com/systems-manager/latest/userguide/troubleshooting-remote-commands.html
5. Right Answer: A,D
Explanation: If you want to inspect the packets themselves , then you need to use custom based software A diagram representation of this is given in the AWS(Amazon Web Service) Security best practises Option C is invalid because VPC Flow logs cannot conduct packet inspection. Option D is invalid because logging is not available for Network Access control lists For more information on AWS(Amazon Web Service) Security best practises, please refer to below URL https://d1.awsstatic.com/whitepapers/Security/AWS_Security_Best_Practices.pdf
Leave a comment