Amazon SAP-C01 Exam Sample Questions By DumpsResources.com

For More Info

https://dumpsresources.com/SAP-C01-dumps-pdf 

Question: 1 

Your company policies require encryption of sensitive data at rest. You are considering the possible options for protecting data while storing it at rest on an EBS data volume, attached to an EC2 instance. Which of these options would allow you to encrypt your data at rest? (Choose 3) 

A. Implement third party volume encryption tools 

B. Implement SSL/TLS for all services running on the server 

C. Encrypt data inside your applications before storing it on EBS 

D. Encrypt data using native data encryption drivers at the file system level 

E. Do nothing as EBS volumes are encrypted by default 

Answer: A,C,D 

Question: 2 

A customer is deploying an SSL enabled web application to AWS and would like to implement a separation of roles between the EC2 service administrators that are entitled to login to instances as well as making API calls and the security officers who will maintain and have exclusive access to the application’s X.509 certificate that contains the private key. 

 

A. Upload the certificate on an S3 bucket owned by the security officers and accessible only by EC2 Role of the web servers. 

B. Configure the web servers to retrieve the certificate upon boot from an CloudHSM is managed by the security officers. 

C. Configure system permissions on the web servers to restrict access to the certificate only to the authority security officers 

D. Configure IAM policies authorizing access to the certificate store only to the security officers and terminate SSL on an ELB. 

Answer: D     

Question: 3

A web company is looking to implement an intrusion detection and prevention system into their deployed VPC. This platform should have the ability to scale to thousands of instances running inside of the VPC. How should they architect their solution to achieve these goals? 

 

A. Configure an instance with monitoring software and the elastic network interface (ENI) set to promiscuous mode packet sniffing to see a traffic across the VPC. 

B. Create a second VPC and route all traffic from the primary application VPC through the second VPC where the scalable virtualized IDS/IPS platform resides. 

C. Configure servers running in the VPC using the host-based 'route' commands to send all traffic through the platform to a scalable virtualized IDS/IPS. 

D. Configure each host with an agent that collects all network traffic and sends that traffic to the IDS/IPS platform for inspection. 

Answer: D   

Question: 4 

A company is storing data on Amazon Simple Storage Service (S3). The company's security policy mandates that data is encrypted at rest. Which of the following methods can achieve this? (Choose 3) 

A. Use Amazon S3 server-side encryption with AWS Key Management Service managed keys. 

B. Use Amazon S3 server-side encryption with customer-provided keys. 

C. Use Amazon S3 server-side encryption with EC2 key pair. 

D. Use Amazon S3 bucket policies to restrict access to the data at rest. 

E. Encrypt the data on the client-side before ingesting to Amazon S3 using their own master key. 

F. Use SSL to encrypt the data while in transit to Amazon S3. 

Answer: A,B,E     


 

  ions SD_WAN Foundations 2019   VMware Specialist   VMware vRealize Specialist   VMware Certified Professional   VCP Data Center Virtualiza...