問題一覧
1
Connection Draining
2
Set up three NAT gateways, one in each public subnet in each AZ. Create a custom route table for each AZ that forwards non-local traffic to the NAT gateway in its AZ
3
Use VPC sharing to share one or more subnets with other AWS accounts belonging to the same parent organization from AWS Organizations
4
Use AWS Config to review resource configurations to meet compliance guidelines and maintain a history of resource configuration changes
5
Use VPC endpoint to access Amazon SQS
6
Create a virtual private gateway (VGW) on the AWS side of the VPN and a Customer Gateway on the on-premises side of the VPN
7
Use Amazon GuardDuty to monitor any malicious activity on data stored in Amazon S3. Use Amazon Macie to identify any sensitive data stored on Amazon S3
8
Configure a Network Address Translation gateway (NAT gateway) in the public subnet of the VPC
9
Use Amazon S3 Object Lock
10
It lets traffic flow from one IP on port 22, It allows any IP to pass through on the HTTP port, It configures a security group's inbound rules
11
It authorizes an entire Classless Inter-Domain Routing (CIDR) except one IP address to access the Amazon S3 bucket
12
Use a bucket policy to grant permission to users in its account as well as to users in another account
13
AWS Secrets Manager
14
Use Secure Sockets Layer certificate (SSL certificate) with SNI
15
Configure Amazon RDS to use SSL for data in transit
16
Check if the security groups allow ping from the source, Check if the route table is configured with internet gateway
17
Trust policy
18
Amazon DynamoDB, Amazon S3
19
Use IAM authentication from AWS Lambda to Amazon RDS PostgreSQL, Attach an AWS Identity and Access Management (IAM) role to AWS Lambda
20
The route for the health check is misconfigured, The security group of the Amazon EC2 instance does not allow for traffic from the security group of the Application Load Balancer
21
Use AWS Site-to-Site VPN as a backup connection, Use AWS Direct Connect connection as a primary connection
22
Add a rule to authorize the security group of the Application Load Balancer
23
Use AWS transit gateway to interconnect the VPCs
24
Data at rest inside the volume is encrypted, Data moving between the volume and the instance is encrypted, Any snapshot created from the volume is encrypted
25
Amazon ElastiCache for Redis/Memcached
26
Amazon API Gateway exposing AWS Lambda Functionality
27
Amazon S3 can encrypt object metadata by using Server-Side Encryption
28
The security group configuration for the database instance does not have the correct rules to allow inbound connections from the application servers
29
Use Amazon S3 Glacier vault to store the sensitive archived data and then use a vault lock policy to enforce compliance controls
30
Add a rule authorizing the Amazon EC2 security group
31
Use AWS WAF IP set statement that specifies the IP addresses that you want to allow through, Use AWS WAF geo match statement listing the countries that you want to block
32
Close the company's AWS account, Configure an Amazon S3 bucket to enable AWS Multi-Factor Authentication (AWS MFA) delete
33
Use AWS Web Application Firewall (AWS WAF) with Amazon CloudFront distribution
34
The route table in the instance’s subnet should have a route to an Internet Gateway, The network access control list (network ACL) associated with the subnet must have rules to allow inbound and outbound traffic
35
Create Amazon CloudFront distribution for the application on Amazon EC2 instances. Deploy AWS WAF on Amazon CloudFront to provide the necessary safety measures
36
Use AWS Site-to-Site VPN to establish encrypted network connectivity between the on-premises data center and AWS Cloud
37
By default, all Amazon DynamoDB tables are encrypted using AWS owned keys, which do not write to AWS CloudTrail logs
38
SSE-C
39
Set up an IAM service role with the appropriate permissions to allow access to the Amazon DynamoDB table. Configure an instance profile to assign this IAM role to the Amazon EC2 instance
40
Server-side encryption with Amazon S3 managed keys (SSE-S3)
41
Set up an AWS Site-to-Site VPN connection
42
Set up Amazon FSx for Windows File Server and move all the media files
43
Set up a Network Load Balancer in the public subnet. Create an Auto Scaling group in the private subnet and associate it with the Network Load Balancer
44
Use an AWS Web Application Firewall (AWS WAF) and setup a rate-based rule
45
Configure a single Amazon S3 bucket to hold all data. Use server-side encryption with Amazon S3 managed keys (SSE-S3) to encrypt the data
46
Create a separate gateway endpoint for Amazon S3 and Amazon DynamoDB each. Add two new target entries for these two gateway endpoints in the route table of the custom VPC
47
Set up an Amazon FSx for ONTAP instance. Configure an FSx for ONTAP file system on the root volume and migrate the data to the FSx for ONTAP volume
48
Set the DeleteOnTermination attribute to False using the command line
49
Create an origin access identity (OAI) and update the Amazon S3 Bucket Policy
50
Set up a service control policy (SCP) that prohibits changes to AWS CloudTrail, and attach it to the developer accounts
xj9 - 19628 - a
xj9 - 19628 - a
critical flaw · 98問 · 2年前xj9 - 19628 - a
xj9 - 19628 - a
98問 • 2年前xj9 - 19628 - b
xj9 - 19628 - b
critical flaw · 30問 · 2年前xj9 - 19628 - b
xj9 - 19628 - b
30問 • 2年前xj9 - 19628 - c
xj9 - 19628 - c
critical flaw · 99問 · 1年前xj9 - 19628 - c
xj9 - 19628 - c
99問 • 1年前xj9 - 19628 - d1
xj9 - 19628 - d1
critical flaw · 99問 · 1年前xj9 - 19628 - d1
xj9 - 19628 - d1
99問 • 1年前xj9 - 19628 - d2
xj9 - 19628 - d2
critical flaw · 98問 · 1年前xj9 - 19628 - d2
xj9 - 19628 - d2
98問 • 1年前1. Shattershot
1. Shattershot
critical flaw · 50問 · 1年前1. Shattershot
1. Shattershot
50問 • 1年前Conquest Book 1
Conquest Book 1
critical flaw · 100問 · 1年前Conquest Book 1
Conquest Book 1
100問 • 1年前k3ch - 2910116 - D1 - A
k3ch - 2910116 - D1 - A
critical flaw · 100問 · 1年前k3ch - 2910116 - D1 - A
k3ch - 2910116 - D1 - A
100問 • 1年前k3ch - 2910116 - D1 - B
k3ch - 2910116 - D1 - B
critical flaw · 65問 · 1年前k3ch - 2910116 - D1 - B
k3ch - 2910116 - D1 - B
65問 • 1年前k3ch - 2910116 - D2 - A
k3ch - 2910116 - D2 - A
critical flaw · 100問 · 1年前k3ch - 2910116 - D2 - A
k3ch - 2910116 - D2 - A
100問 • 1年前k3ch - 2910116 - D2 - B
k3ch - 2910116 - D2 - B
critical flaw · 55問 · 1年前k3ch - 2910116 - D2 - B
k3ch - 2910116 - D2 - B
55問 • 1年前k3ch - 2910116 - D3 - A
k3ch - 2910116 - D3 - A
critical flaw · 100問 · 1年前k3ch - 2910116 - D3 - A
k3ch - 2910116 - D3 - A
100問 • 1年前k3ch - 2910116 - D3 - B
k3ch - 2910116 - D3 - B
critical flaw · 63問 · 1年前k3ch - 2910116 - D3 - B
k3ch - 2910116 - D3 - B
63問 • 1年前k3ch - 2910116 - D4 - A
k3ch - 2910116 - D4 - A
critical flaw · 100問 · 1年前k3ch - 2910116 - D4 - A
k3ch - 2910116 - D4 - A
100問 • 1年前1. X-Tinction Agenda
1. X-Tinction Agenda
critical flaw · 100問 · 1年前1. X-Tinction Agenda
1. X-Tinction Agenda
100問 • 1年前2. X-Tinction Agenda
2. X-Tinction Agenda
critical flaw · 100問 · 1年前2. X-Tinction Agenda
2. X-Tinction Agenda
100問 • 1年前3. X-Tinction Agenda
3. X-Tinction Agenda
critical flaw · 100問 · 1年前3. X-Tinction Agenda
3. X-Tinction Agenda
100問 • 1年前4. X-Tinction Agenda
4. X-Tinction Agenda
critical flaw · 90問 · 1年前4. X-Tinction Agenda
4. X-Tinction Agenda
90問 • 1年前Executioner's Song Book 1
Executioner's Song Book 1
critical flaw · 30問 · 1年前Executioner's Song Book 1
Executioner's Song Book 1
30問 • 1年前問題一覧
1
Connection Draining
2
Set up three NAT gateways, one in each public subnet in each AZ. Create a custom route table for each AZ that forwards non-local traffic to the NAT gateway in its AZ
3
Use VPC sharing to share one or more subnets with other AWS accounts belonging to the same parent organization from AWS Organizations
4
Use AWS Config to review resource configurations to meet compliance guidelines and maintain a history of resource configuration changes
5
Use VPC endpoint to access Amazon SQS
6
Create a virtual private gateway (VGW) on the AWS side of the VPN and a Customer Gateway on the on-premises side of the VPN
7
Use Amazon GuardDuty to monitor any malicious activity on data stored in Amazon S3. Use Amazon Macie to identify any sensitive data stored on Amazon S3
8
Configure a Network Address Translation gateway (NAT gateway) in the public subnet of the VPC
9
Use Amazon S3 Object Lock
10
It lets traffic flow from one IP on port 22, It allows any IP to pass through on the HTTP port, It configures a security group's inbound rules
11
It authorizes an entire Classless Inter-Domain Routing (CIDR) except one IP address to access the Amazon S3 bucket
12
Use a bucket policy to grant permission to users in its account as well as to users in another account
13
AWS Secrets Manager
14
Use Secure Sockets Layer certificate (SSL certificate) with SNI
15
Configure Amazon RDS to use SSL for data in transit
16
Check if the security groups allow ping from the source, Check if the route table is configured with internet gateway
17
Trust policy
18
Amazon DynamoDB, Amazon S3
19
Use IAM authentication from AWS Lambda to Amazon RDS PostgreSQL, Attach an AWS Identity and Access Management (IAM) role to AWS Lambda
20
The route for the health check is misconfigured, The security group of the Amazon EC2 instance does not allow for traffic from the security group of the Application Load Balancer
21
Use AWS Site-to-Site VPN as a backup connection, Use AWS Direct Connect connection as a primary connection
22
Add a rule to authorize the security group of the Application Load Balancer
23
Use AWS transit gateway to interconnect the VPCs
24
Data at rest inside the volume is encrypted, Data moving between the volume and the instance is encrypted, Any snapshot created from the volume is encrypted
25
Amazon ElastiCache for Redis/Memcached
26
Amazon API Gateway exposing AWS Lambda Functionality
27
Amazon S3 can encrypt object metadata by using Server-Side Encryption
28
The security group configuration for the database instance does not have the correct rules to allow inbound connections from the application servers
29
Use Amazon S3 Glacier vault to store the sensitive archived data and then use a vault lock policy to enforce compliance controls
30
Add a rule authorizing the Amazon EC2 security group
31
Use AWS WAF IP set statement that specifies the IP addresses that you want to allow through, Use AWS WAF geo match statement listing the countries that you want to block
32
Close the company's AWS account, Configure an Amazon S3 bucket to enable AWS Multi-Factor Authentication (AWS MFA) delete
33
Use AWS Web Application Firewall (AWS WAF) with Amazon CloudFront distribution
34
The route table in the instance’s subnet should have a route to an Internet Gateway, The network access control list (network ACL) associated with the subnet must have rules to allow inbound and outbound traffic
35
Create Amazon CloudFront distribution for the application on Amazon EC2 instances. Deploy AWS WAF on Amazon CloudFront to provide the necessary safety measures
36
Use AWS Site-to-Site VPN to establish encrypted network connectivity between the on-premises data center and AWS Cloud
37
By default, all Amazon DynamoDB tables are encrypted using AWS owned keys, which do not write to AWS CloudTrail logs
38
SSE-C
39
Set up an IAM service role with the appropriate permissions to allow access to the Amazon DynamoDB table. Configure an instance profile to assign this IAM role to the Amazon EC2 instance
40
Server-side encryption with Amazon S3 managed keys (SSE-S3)
41
Set up an AWS Site-to-Site VPN connection
42
Set up Amazon FSx for Windows File Server and move all the media files
43
Set up a Network Load Balancer in the public subnet. Create an Auto Scaling group in the private subnet and associate it with the Network Load Balancer
44
Use an AWS Web Application Firewall (AWS WAF) and setup a rate-based rule
45
Configure a single Amazon S3 bucket to hold all data. Use server-side encryption with Amazon S3 managed keys (SSE-S3) to encrypt the data
46
Create a separate gateway endpoint for Amazon S3 and Amazon DynamoDB each. Add two new target entries for these two gateway endpoints in the route table of the custom VPC
47
Set up an Amazon FSx for ONTAP instance. Configure an FSx for ONTAP file system on the root volume and migrate the data to the FSx for ONTAP volume
48
Set the DeleteOnTermination attribute to False using the command line
49
Create an origin access identity (OAI) and update the Amazon S3 Bucket Policy
50
Set up a service control policy (SCP) that prohibits changes to AWS CloudTrail, and attach it to the developer accounts