Free Amazon SCS-C02 Exam Questions

Become Amazon Certified with updated SCS-C02 exam questions and correct answers

Page:    1 / 114      
Total 569 Questions | Updated On: Dec 06, 2025
Add To Cart
Question 1

A developer operations team uses AWS Identity and Access Management (1AM) to manage user permissions The team created an Amazon EC2 instance profile role that uses an AWS managed Readonly Access policy. When an application that is running on Amazon EC2 tries to read a file from an encrypted Amazon S3 bucket, the application receives an AccessDenied error. The team administrator has verified that the S3 bucket policy allows everyone in the account to access the S3 bucket. There is no object ACL that is attached to the file. What should the administrator do to fix the 1AM access issue?


Answer: C
Question 2

A security engineer needs to create an IAM Key Management Service used to encrypt all data stored in a company’s Amazon S3 Buckets in the us-west-1 Region. The keywill use server-side encryption. Usage of the key must be limited to requests coming from AmazonS3 within the company's account.Which statement in the KMS key policy will meet these requirements? 


Answer: A
Question 3

A company has several AWS Lambda functions. While reviewing the Lambda functions a security engineer discovers that sensitive information is being stored in environment variables and is viewable as plaintext in the Lambda console. The values of the sensitive information are less than 8 KB and there are over 10,000 values stored across the functions.
What is the MOST cost-effective way to address this security issue?


Answer: B
Question 4

A financial firm receives a warning from the AWS Trust and Safety team about a potential security threat. An IAM access key linked to an IT administrator seems to have been compromised. This key is employed in an automated process that uses AWS Lambda functions to launch AWS Elastic Beanstalk environments.The firm's security engineer is tasked with addressing this security issue, preventing further use of the exposed access key, and bolstering security practices.Which of the following steps would be the most appropriate in this scenario?


Answer: D
Question 5

An organization wants to log all IAM API calls made within all of its IAM accounts, and must have a central place to analyze these logs. What steps should be taken to meet these requirements in the MOST secure manner? (Select TWO) 


Answer: A,E
Page:    1 / 114      
Total 569 Questions | Updated On: Dec 06, 2025
Add To Cart

© Copyrights DumpsCertify 2025. All Rights Reserved

We use cookies to ensure your best experience. So we hope you are happy to receive all cookies on the DumpsCertify.