Examcollection offers free demo for AWS-Certified-Security-Specialty exam. "Amazon AWS Certified Security - Specialty", also known as AWS-Certified-Security-Specialty exam, is a Amazon Certification. This set of posts, Passing the Amazon AWS-Certified-Security-Specialty exam, will help you answer those questions. The AWS-Certified-Security-Specialty Questions & Answers covers all the knowledge points of the real exam. 100% real Amazon AWS-Certified-Security-Specialty exams and revised by experts!

Also have AWS-Certified-Security-Specialty free dumps questions for you:

NEW QUESTION 1
A company usesAWS Organizations to run workloads in multiple AWS accounts Currently the individual team members at the company access all Amazon EC2 instances remotely by using SSH or Remote Desktop Protocol (RDP) The company does not have any audit trails and security groups are occasionally open The company must secure access management and implement a centralized togging solution
Which solution will meet these requirements MOST securely?

  • A. Configure trusted access for AWS System Manager in Organizations Configure a bastion host from the management account Replace SSH and RDP by using Systems Manager Session Manager from the management account Configure Session Manager logging to Amazon CloudWatch Logs
  • B. Replace SSH and RDP with AWS Systems Manager Session Manager Install Systems Manager Agent (SSM Agent) on the instances Attach the
  • C. AmazonSSMManagedlnstanceCore role to the instances Configure session data streaming to Amazon CloudWatch Logs Create a separate logging account that has appropriate cross-account permissions to audit the log data
  • D. Install a bastion host in the management account Reconfigure all SSH and RDP to allow access only from the bastion host Install AWS Systems Manager Agent (SSM Agent) on the bastion host Attach the AmazonSSMManagedlnstanceCore role to the bastion host Configure session data streaming to Amazon CloudWatch Logs in a separate logging account to audit log data
  • E. Replace SSH and RDP with AWS Systems Manager State Manager Install Systems Manager Agent (SSM Agent) on the instances Attach theAmazonSSMManagedlnstanceCore role to the instances Configure session data streaming to AmazonCloudTrail Use CloudTrail Insights to analyze the trail data

Answer: C

Explanation:
To meet the requirements of securing access management and implementing a centralized logging solution, the most secure solution would be to:
AWS-Certified-Security-Specialty dumps exhibit Install a bastion host in the management account.
AWS-Certified-Security-Specialty dumps exhibit Reconfigure all SSH and RDP to allow access only from the bastion host.
AWS-Certified-Security-Specialty dumps exhibit Install AWS Systems Manager Agent (SSM Agent) on the bastion host.
AWS-Certified-Security-Specialty dumps exhibit Attach the AmazonSSMManagedlnstanceCore role to the bastion host.
AWS-Certified-Security-Specialty dumps exhibit Configure session data streaming to Amazon CloudWatch Logs in a separate logging account to audit log data
This solution provides the following security benefits:
AWS-Certified-Security-Specialty dumps exhibit It uses AWS Systems Manager Session Manager instead of traditional SSH and RDP protocols, which provides a secure method for accessing EC2 instances without requiring inbound firewall rules or open ports.
AWS-Certified-Security-Specialty dumps exhibit It provides audit trails by configuring Session Manager logging to Amazon CloudWatch Logs and creating a separate logging account to audit the log data.
AWS-Certified-Security-Specialty dumps exhibit It uses the AWS Systems Manager Agent to automate common administrative tasks and improve the security posture of the instances.
AWS-Certified-Security-Specialty dumps exhibit The separate logging account with cross-account permissions provides better data separation and improves security posture.
https://aws.amazon.com/solutions/implementations/centralized-logging/

NEW QUESTION 2
A company has recently recovered from a security incident that required the restoration of Amazon EC2 instances from snapshots. The company uses an AWS Key
Management Service (AWS KMS) customer managed key to encrypt all Amazon Elastic Block Store (Amazon EBS) snapshots.
The company performs a gap analysis of its disaster recovery procedures and backup strategies. A security engineer needs to implement a solution so that the company can recover the EC2 instances if the AWS account is compromised and the EBS snapshots are deleted.
Which solution will meet this requirement?

  • A. Create a new Amazon S3 bucke
  • B. Use EBS lifecycle policies to move EBS snapshots to the new S3 bucke
  • C. Use lifecycle policies to move snapshots to the S3 Glacier Instant Retrieval storage clas
  • D. Use S3 Object Lock to prevent deletion of the snapshots.
  • E. Use AWS Systems Manager to distribute a configuration that backs up all attached disks to Amazon S3.
  • F. Create a new AWS account that has limited privilege
  • G. Allow the new account to access the KMS key that encrypts the EBS snapshot
  • H. Copy the encrypted snapshots to the new account on a recurring basis.
  • I. Use AWS Backup to copy EBS snapshots to Amazon S3. Use S3 Object Lock to prevent deletion of the snapshots.

Answer: C

Explanation:
This solution meets the requirement of recovering the EC2 instances if the AWS account is compromised and the EBS snapshots are deleted. By creating a new AWS account with limited privileges, the company can isolate the backup snapshots from the main account and reduce the risk of accidental or malicious deletion. By allowing the new account to access the KMS key that encrypts the EBS snapshots, the company can ensure that the snapshots are copied in an encrypted form and can be decrypted when needed. By copying the encrypted snapshots to the new account on a recurring basis, the company can maintain a consistent backup schedule and minimize data loss.

NEW QUESTION 3
A company accidentally deleted the private key for an Amazon Elastic Block Store (Amazon EBS)-backed Amazon EC2 instance. A security engineer needs to regain access to the instance.
Which combination of steps will meet this requirement? (Choose two.)

  • A. Stop the instanc
  • B. Detach the root volum
  • C. Generate a new key pair.
  • D. Keep the instance runnin
  • E. Detach the root volum
  • F. Generate a new key pair.
  • G. When the volume is detached from the original instance, attach the volume to another instance as a data volum
  • H. Modify the authorized_keys file with a new public ke
  • I. Move the volume back to the original instanc
  • J. Start the instance.
  • K. When the volume is detached from the original instance, attach the volume to another instance as a data volum
  • L. Modify the authorized_keys file with a new private ke
  • M. Move the volume back to the original instanc
  • N. Start the instance.
  • O. When the volume is detached from the original instance, attach the volume to another instance as a data volum
  • P. Modify the authorized_keys file with a new public ke
  • Q. Move the volume back to the original instance that is running.

Answer: AC

Explanation:
If you lose the private key for an EBS-backed instance, you can regain access to your instance. You must stop the instance, detach its root volume and attach it to another instance as a data volume, modify the authorized_keys file with a new public key, move the volume back to the original instance, and restart the instance. https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/TroubleshootingInstancesConnecting.html#replacing

NEW QUESTION 4
A company's policy requires that all API keys be encrypted and stored separately from source code in a centralized security account. This security account is managed by the company's security team However, an audit revealed that an API key is steed with the source code of an IAM Lambda function m an IAM CodeCommit repository in the DevOps account
How should the security learn securely store the API key?

  • A. Create a CodeCommit repository in the security account using IAM Key Management Service (IAMKMS) tor encryption Require the development team to migrate the Lambda source code to this repository
  • B. Store the API key in an Amazon S3 bucket in the security account using server-side encryption with Amazon S3 managed encryption keys (SSE-S3) to encrypt the key Create a resigned URL tor the S3 ke
  • C. and specify the URL m a Lambda environmental variable in the IAM CloudFormation template Update the Lambda function code to retrieve the key using the URL and call the API
  • D. Create a secret in IAM Secrets Manager in the security account to store the API key using IAM Key Management Service (IAM KMS) tor encryption Grant access to the IAM role used by the Lambda function so that the function can retrieve the key from Secrets Manager and call the API
  • E. Create an encrypted environment variable for the Lambda function to store the API key using IAM Key Management Service (IAM KMS) tor encryption Grant access to the IAM role used by the Lambda function so that the function can decrypt the key at runtime

Answer: C

Explanation:
To securely store the API key, the security team should do the following:
AWS-Certified-Security-Specialty dumps exhibit Create a secret in AWS Secrets Manager in the security account to store the API key using AWS Key Management Service (AWS KMS) for encryption. This allows the security team to encrypt and manage the API key centrally, and to configure automatic rotation schedules for it.
AWS-Certified-Security-Specialty dumps exhibit Grant access to the IAM role used by the Lambda function so that the function can retrieve the key from Secrets Manager and call the API. This allows the security team to avoid storing the API key with the source code, and to use IAM policies to control access to the secret.

NEW QUESTION 5
A company purchased a subscription to a third-party cloud security scanning solution that integrates with AWS Security Hub. A security engineer needs to implement a solution that will remediate the findings
from the third-party scanning solution automatically. Which solution will meet this requirement?

  • A. Set up an Amazon EventBridge rule that reacts to new Security Hub find-ing
  • B. Configure an AWS Lambda function as the target for the rule to reme-diate the findings.
  • C. Set up a custom action in Security Hu
  • D. Configure the custom action to call AWS Systems Manager Automation runbooks to remediate the findings.
  • E. Set up a custom action in Security Hu
  • F. Configure an AWS Lambda function as the target for the custom action to remediate the findings.
  • G. Set up AWS Config rules to use AWS Systems Manager Automation runbooks to remediate the findings.

Answer: A

NEW QUESTION 6
A company is using IAM Secrets Manager to store secrets for its production Amazon RDS database. The Security Officer has asked that secrets be rotated every 3 months. Which solution would allow the company to securely rotate the secrets? (Select TWO.)

  • A. Place the RDS instance in a public subnet and an IAM Lambda function outside the VP
  • B. Schedule the Lambda function to run every 3 months to rotate the secrets.
  • C. Place the RDS instance in a private subnet and an IAM Lambda function inside the VPC in the private subne
  • D. Configure the private subnet to use a NAT gatewa
  • E. Schedule the Lambda function to run every 3 months to rotate the secrets.
  • F. Place the RDS instance in a private subnet and an IAM Lambda function outside the VP
  • G. Configure the private subnet to use an internet gatewa
  • H. Schedule the Lambda function to run every 3 months lo rotate the secrets.
  • I. Place the RDS instance in a private subnet and an IAM Lambda function inside the VPC in the private subne
  • J. Schedule the Lambda function to run quarterly to rotate the secrets.
  • K. Place the RDS instance in a private subnet and an IAM Lambda function inside the VPC in the private subne
  • L. Configure a Secrets Manager interface endpoin
  • M. Schedule the Lambda function to run every 3 months to rotate the secrets.

Answer: BE

Explanation:
these are the solutions that can securely rotate the secrets for the production RDS database using Secrets Manager. Secrets Manager is a service that helps you manage secrets such as database credentials, API keys, and passwords. You can use Secrets Manager to rotate secrets automatically by using a Lambda function that runs on a schedule. The Lambda function needs to have access to both the RDS instance and the Secrets Manager service. Option B places the RDS instance in a private subnet and the Lambda function in the same VPC in another private subnet. The private subnet with the Lambda function needs to use a NAT gateway to access Secrets Manager over the internet. Option E places the RDS instance and the Lambda function in the same private subnet and configures a Secrets Manager interface endpoint, which is a private connection between the VPC and Secrets Manager. The other options are either insecure or incorrect for rotating secrets using Secrets Manager.

NEW QUESTION 7
Example.com is hosted on Amazon EC2 instances behind an Application Load Balancer (ALB). Third-party host intrusion detection system (HIDS) agents that capture the traffic of the EC2 instance are running on each host. The company must ensure they are using privacy enhancing technologies for users, without losing the assurance the third-party solution offers.
What is the MOST secure way to meet these requirements?

  • A. Enable TLS pass through on the ALB, and handle decryption at the server using Elliptic Curve Diffie-Hellman (ECDHE) cipher suites.
  • B. Create a listener on the ALB that uses encrypted connections with Elliptic Curve Diffie-Hellman (ECDHE) cipher suites, and pass the traffic in the clear to the server.
  • C. Create a listener on the ALB that uses encrypted connections with Elliptic Curve Diffie-Hellman (ECDHE) cipher suites, and use encrypted connections to the servers that do not enable Perfect Forward Secrecy (PFS).
  • D. Create a listener on the ALB that does not enable Perfect Forward Secrecy (PFS) cipher suites, and use encrypted connections to the servers using Elliptic Curve Diffie-Hellman (ECDHE) cipher suites.

Answer: D

Explanation:
the most secure way to meet the requirements. TLS is a protocol that provides encryption and authentication for data in transit. ALB is a service that distributes incoming traffic across multiple EC2 instances. HIDS is a system that monitors and detects malicious activity on a host. ECDHE is a type of cipher suite that supports perfect forward secrecy, which is a property that ensures that past and current TLS traffic stays secure even if the certificate private key is leaked. By creating a listener on the ALB that does not enable PFS cipher suites, and using encrypted connections to the servers using ECDHE cipher suites, you can ensure that the HIDS agents can capture the traffic of the EC2 instance without compromising the privacy of the users. The other options are either less secure or less compatible with the third-party solution.

NEW QUESTION 8
A company needs to encrypt all of its data stored in Amazon S3. The company wants to use IAM Key Management Service (IAM KMS) to create and manage its encryption keys. The company's security policies require the ability to Import the company's own key material for the keys, set an expiration date on the keys, and delete keys immediately, if needed.
How should a security engineer set up IAM KMS to meet these requirements?

  • A. Configure IAM KMS and use a custom key stor
  • B. Create a customer managed CMK with no key material Import the company's keys and key material into the CMK
  • C. Configure IAM KMS and use the default Key store Create an IAM managed CMK with no key material Import the company's key material into the CMK
  • D. Configure IAM KMS and use the default key store Create a customer managed CMK with no key material import the company's key material into the CMK
  • E. Configure IAM KMS and use a custom key stor
  • F. Create an IAM managed CMK with no key material.Import the company's key material into the CMK.

Answer: A

Explanation:
To meet the requirements of importing their own key material, setting an expiration date on the keys, and deleting keys immediately, the security engineer should do the following:
AWS-Certified-Security-Specialty dumps exhibit Configure AWS KMS and use a custom key store. This allows the security engineer to use a key manager outside of AWS KMS that they own and manage, such as an AWS CloudHSM cluster or an external key manager.
AWS-Certified-Security-Specialty dumps exhibit Create a customer managed CMK with no key material. Import the company’s keys and key material into the CMK. This allows the security engineer to use their own key material for encryption and decryption operations, and to specify an expiration date for it.

NEW QUESTION 9
A security engineer has enabled IAM Security Hub in their IAM account, and has enabled the Center for internet Security (CIS) IAM Foundations compliance standard. No evaluation results on compliance are returned in the Security Hub console after several hours. The engineer wants to ensure that Security Hub can evaluate their resources for CIS IAM Foundations compliance.
Which steps should the security engineer take to meet these requirements?

  • A. Add full Amazon Inspector IAM permissions to the Security Hub service role to allow it to perform the CIS compliance evaluation
  • B. Ensure that IAM Trusted Advisor Is enabled in the account and that the Security Hub service role has permissions to retrieve the Trusted Advisor security-related recommended actions
  • C. Ensure that IAM Confi
  • D. is enabled in the account, and that the required IAM Config rules have been created for the CIS compliance evaluation
  • E. Ensure that the correct trail in IAM CloudTrail has been configured for monitoring by Security Hub and that the Security Hub service role has permissions to perform the GetObject operation on CloudTrails Amazon S3 bucket

Answer: C

Explanation:
To ensure that Security Hub can evaluate their resources for CIS AWS Foundations compliance, the security engineer should do the following:
AWS-Certified-Security-Specialty dumps exhibit Ensure that AWS Config is enabled in the account. This is a service that enables continuous assessment and audit of your AWS resources for compliance.
AWS-Certified-Security-Specialty dumps exhibit Ensure that the required AWS Config rules have been created for the CIS compliance evaluation. These are rules that represent your desired configuration settings for specific AWS resources or for an entire AWS account.

NEW QUESTION 10
A company’s security team needs to receive a notification whenever an AWS access key has not been rotated in 90 or more days. A security engineer must develop a solution that provides these notifications automatically.
Which solution will meet these requirements with the LEAST amount of effort?

  • A. Deploy an AWS Config managed rule to run on a periodic basis of 24 hour
  • B. Select theaccess-keys-rotated managed rule, and set the maxAccessKeyAge parameter to 90 day
  • C. Create an Amazon EventBridge (Amazon CloudWatch Events) rule with an event pattern that matches the compliance type of NON_COMPLIANT from AWS Config for the managed rul
  • D. Configure EventBridge (CloudWatch Events) to send an Amazon Simple Notification Service (Amazon SNS) notification to the security team.
  • E. Create a script to export a .csv file from the AWS Trusted Advisor check for IAM access key rotation.Load the script into an AWS Lambda function that will upload the .csv file to an Amazon S3 bucke
  • F. Create an Amazon Athena table query that runs when the .csv file is uploaded to the S3 bucke
  • G. Publish the results for any keys older than 90 days by using an invocation of an Amazon Simple Notification Service (Amazon SNS) notification to the security team.
  • H. Create a script to download the IAM credentials report on a periodic basi
  • I. Load the script into an AWS Lambda function that will run on a schedule through Amazon EventBridge (Amazon CloudWatch Events). Configure the Lambda script to load the report into memory and to filter the report for recordsin which the key was last rotated at least 90 days ag
  • J. If any records are detected, send an Amazon Simple Notification Service (Amazon SNS) notification to the security team.
  • K. Create an AWS Lambda function that queries the IAM API to list all the user
  • L. Iterate through the users by using the ListAccessKeys operatio
  • M. Verify that the value in the CreateDate field is not at least 90 days ol
  • N. Send an Amazon Simple Notification Service (Amazon SNS) notification to the security team if the value is at least 90 days ol
  • O. Create an Amazon EventBridge (Amazon CloudWatch Events) rule to schedule the Lambda function to run each day.

Answer: A

NEW QUESTION 11
To meet regulatory requirements, a Security Engineer needs to implement an IAM policy that restricts the use of AWS services to the us-east-1 Region.
What policy should the Engineer implement?

  • A. AWS-Certified-Security-Specialty dumps exhibit
  • B. A computer code with black text Description automatically generatedAWS-Certified-Security-Specialty dumps exhibit
  • C. A computer code with black text Description automatically generatedAWS-Certified-Security-Specialty dumps exhibit
  • D. A computer code with text Description automatically generatedAWS-Certified-Security-Specialty dumps exhibit

Answer: C

Explanation:
https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_examples_aws_deny-requested-region.h

NEW QUESTION 12
A company plans to use AWS Key Management Service (AWS KMS) to implement an encryption strategy to protect data at rest. The company requires client-side encryption for company projects. The company is currently conducting multiple projects to test the company's use of AWS KMS. These tests have led to a sudden increase in the company's AWS resource consumption. The test projects include applications that issue multiple requests each second to KMS endpoints for encryption activities.
The company needs to develop a solution that does not throttle the company's ability to use AWS KMS. The solution must improve key usage for client-side
encryption and must be cost optimized. Which solution will meet these requirements?

  • A. Use keyrings with the AWS Encryption SD
  • B. Use each keyring individually or combine keyrings into amulti-keyrin
  • C. Decrypt the data by using a keyring that has the primary key in the multi-keyring.
  • D. Use data key cachin
  • E. Use the local cache that the AWS Encryption SDK provides with a caching cryptographic materials manager.
  • F. Use KMS key rotatio
  • G. Use a local cache in the AWS Encryption SDK with a caching cryptographic materials manager.
  • H. Use keyrings with the AWS Encryption SD
  • I. Use each keyring individually or combine keyrings into a multi-keyrin
  • J. Use any of the wrapping keys in the multi-keyring to decrypt the data.

Answer: B

Explanation:
The correct answer is B. Use data key caching. Use the local cache that the AWS Encryption SDK provides with a caching cryptographic materials manager.
This answer is correct because data key caching can improve performance, reduce cost, and help the company stay within the service limits of AWS KMS. Data key caching stores data keys and related cryptographic material in a cache, and reuses them for encryption and decryption operations. This reduces the number of requests to AWS KMS endpoints and avoids throttling. The AWS Encryption SDK provides a local cache and a caching cryptographic materials manager (caching CMM) that interacts with the cache and enforces security thresholds that the company can set1.
The other options are incorrect because:
AWS-Certified-Security-Specialty dumps exhibit A. Using keyrings with the AWS Encryption SDK does not address the problem of throttling or cost optimization. Keyrings are used to generate, encrypt, and decrypt data keys, but they do not cache or reuse them. Using each keyring individually or combining them into a multi-keyring does not reduce the number of requests to AWS KMS endpoints2.
AWS-Certified-Security-Specialty dumps exhibit C. Using KMS key rotation does not address the problem of throttling or cost optimization. Key rotation is a security practice that creates new cryptographic material for a KMS key every year, but it does not affect the data that the KMS key protects. Key rotation does not reduce the number of requests to AWS KMS endpoints, and it might incur additional costs for storing multiple versions of key material3.
AWS-Certified-Security-Specialty dumps exhibit D. Using keyrings with the AWS Encryption SDK does not address the problem of throttling or cost optimization, as explained in option A. Moreover, using any of the wrapping keys in the multi-keyring to decrypt the data is not a valid option, because only one of the wrapping keys can decrypt a given data key. The wrapping key that encrypts a data key is stored in the encrypted data key structure, and only that wrapping key can decrypt it4.
References:
1: Data key caching - AWS Encryption SDK 2: Using keyrings - AWS Encryption SDK 3: Rotating AWS KMS keys - AWS Key Management Service 4: How keyrings work - AWS Encryption SDK

NEW QUESTION 13
A company manages three separate IAM accounts for its production, development, and test environments, Each Developer is assigned a unique IAM user under the development account. A new application hosted on an Amazon EC2 instance in the developer account requires read access to the archived documents stored in an Amazon S3 bucket in the production account.
How should access be granted?

  • A. Create an IAM role in the production account and allow EC2 instances in the development account to assume that role using the trust polic
  • B. Provide read access for the required S3 bucket to this role.
  • C. Use a custom identity broker to allow Developer IAM users to temporarily access the S3 bucket.
  • D. Create a temporary IAM user for the application to use in the production account.
  • E. Create a temporary IAM user in the production account and provide read access to Amazon S3.Generate the temporary IAM user's access key and secret key and store these on the EC2 instance used by the application in the development account.

Answer: A

Explanation:
https://IAM.amazon.com/premiumsupport/knowledge-center/cross-account-access-s3/

NEW QUESTION 14
A web application gives users the ability to log in verify their membership's validity and browse artifacts that are stored in an Amazon S3 bucket. When a user attempts to download an object, the application must verify the permission to access the object and allow the user to download the object from a custom domain name such as example com.
What is the MOST secure way for a security engineer to implement this functionality?

  • A. Configure read-only access to the object by using a bucket AC
  • B. Remove the access after a set time has elapsed.
  • C. Implement an IAM policy to give the user read access to the S3 bucket.
  • D. Create an S3 presigned URL Provide the S3 presigned URL to the user through the application.
  • E. Create an Amazon CloudFront signed UR
  • F. Provide the CloudFront signed URL to the user through the application.

Answer: D

Explanation:
For this scenario you would need to set up static website hosting because a custom domain name is listed as a requirement. "Amazon S3 website endpoints do not support HTTPS or access points. If you want to use HTTPS, you can use Amazon CloudFront to serve a static website hosted on Amazon S3." This is not secure. https://docs.aws.amazon.com/AmazonS3/latest/userguide/website-hosting-custom-domain-walkthrough.html CloudFront signed URLs allow much more fine-grained control as well as HTTPS access with custom domain names:
https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/private-content-signed-urls.html

NEW QUESTION 15
An ecommerce company has a web application architecture that runs primarily on containers. The application containers are deployed on Amazon Elastic Container Service (Amazon ECS). The container images for the application are stored in Amazon Elastic Container Registry (Amazon ECR).
The company's security team is performing an audit of components of the application architecture. The security team identifies issues with some container images that are stored in the container repositories.
The security team wants to address these issues by implementing continual scanning and on-push scanning of the container images. The security team needs to implement a solution that makes any findings from these scans visible in a centralized dashboard. The security team plans to use the dashboard to view these findings along with other security-related findings that they intend to generate in the future.
There are specific repositories that the security team needs to exclude from the scanning process. Which solution will meet these requirements?

  • A. Use Amazon Inspecto
  • B. Create inclusion rules in Amazon ECR to match repos-itories that need to be scanne
  • C. Push Amazon Inspector findings to AWS Se-curity Hub.
  • D. Use ECR basic scanning of container image
  • E. Create inclusion rules in Ama-zon ECR to match repositories that need to be scanne
  • F. Push findings to AWS Security Hub.
  • G. Use ECR basic scanning of container image
  • H. Create inclusion rules in Ama-zon ECR to match repositories that need to be scanne
  • I. Push findings to Amazon Inspector.
  • J. Use Amazon Inspecto
  • K. Create inclusion rules in Amazon Inspector to match repositories that need to be scanne
  • L. Push Amazon Inspector findings to AWS Config.

Answer: A

NEW QUESTION 16
......

P.S. Easily pass AWS-Certified-Security-Specialty Exam with 372 Q&As Downloadfreepdf.net Dumps & pdf Version, Welcome to Download the Newest Downloadfreepdf.net AWS-Certified-Security-Specialty Dumps: https://www.downloadfreepdf.net/AWS-Certified-Security-Specialty-pdf-download.html (372 New Questions)