AWS KMS is a fully managed key service, while CloudHSM provides dedicated
hardware security modules for strict compliance requirements.
Question 1: Which AWS service is primarily used to control access to AWS resources?
- A. AWS Shield
- B. Amazon GuardDuty
- C. AWS Identity and Access Management (IAM) ✅
- D. AWS Config
Explanation: AWS IAM allows you to manage users, roles, policies, and permissions to securely control access to AWS resources.
Question 2: Which AWS service provides continuous threat detection using machine learning?
- A. AWS WAF
- B. Amazon Inspector
- C. Amazon GuardDuty ✅
- D. AWS CloudTrail
Explanation: Amazon GuardDuty analyzes CloudTrail logs, VPC Flow Logs, and DNS logs to detect malicious activity.
Question 3: Which service should be used to encrypt data at rest in Amazon S3?
- A. AWS Shield
- B. AWS Key Management Service (KMS) ✅
- C. AWS Secrets Manager
- D. Amazon Macie
Explanation: AWS KMS is commonly used with S3 for server-side encryption and secure key management.
Question 4: Which AWS service helps protect web applications from common exploits such as SQL injection?
- A. AWS Shield Advanced
- B. Amazon Inspector
- C. AWS Web Application Firewall (WAF) ✅
- D. AWS Config
Explanation: AWS WAF allows you to create rules to block common web exploits like SQL injection and cross-site scripting (XSS).
Question 5: Which AWS service is best suited for discovering and classifying sensitive data in S3 buckets?
- A. AWS Config
- B. Amazon Macie ✅
- C. Amazon GuardDuty
- D. AWS CloudTrail
Explanation: Amazon Macie uses machine learning to identify and protect sensitive data such as PII stored in Amazon S3.
Download/Practice full AWS SCS-C02 exam questions..