MultipleChoice
A company is building a data lake on Amazon S3. The data consists of millions of small files containing sensitive information. The Security team has the following requirements for the architecture:
* Data must be encrypted in transit.
* Data must be encrypted at rest.
* The bucket must be private, but if the bucket is accidentally made public, the data must remain confidential.
Which combination of steps would meet the requirements? (Choose two.)
OptionsMultipleChoice
You are designing a custom IAM policy that would allow uses to list buckets in S3 only if they are MFA authenticated. Which of the following would best match this requirement?
OptionsMultipleChoice
Which of the following bucket policies will ensure that objects being uploaded to a bucket called 'demo' are encrypted.
Please select:
OptionsMultipleChoice
A company's Director of information Security wants a daily email report from AWS that contains recommendations for each company account to meet AWS Security best practices
Which solution would meet these requirements?
OptionsMultipleChoice
A company's Security Engineer has been asked to monitor and report all AWS account root user activities
Which of the following would enable the Security Engineer to monitor and report all root user activities? (Select TWO)
OptionsMultipleChoice
A security engineer to ensure their company's uses of AWS meets AWS security best practices. As part of this, the AWS account root user must not be used for daily work. The root user must be monitored for use, and the Security team must be alerted as quickly as possible if the root user is used.
Which solution meets these requirements?
Options