exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 125 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 125
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A Security Engineer is setting up an AWS CloudTrail trail for all regions in an AWS account. For added security, the logs are stored using server-side encryption with AWS KMS-managed keys (SSE-KMS) and have log integrity validation enabled.
While testing the solution, the Security Engineer discovers that the digest files are readable, but the log files are not. What is the MOST likely cause?

  • A. The log files fail integrity validation and automatically are marked as unavailable.
  • B. The KMS key policy does not grant the Security Engineer's IAM user or role permissions to decrypt with it.
  • C. The bucket is set up to use server-side encryption with Amazon S3-managed keys (SSE-S3) as the default and does not allow SSE-KMS-encrypted files.
  • D. An IAM policy applicable to the Security Engineer's IAM user or role denies access to the "CloudTrail/" prefix in the Amazon S3 bucket.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
RaySmith
Highly Voted 3 years, 9 months ago
B for me
upvoted 13 times
...
Daniel76
Highly Voted 3 years, 8 months ago
B A- You need to validate digest file to detect if any integrity issue. It does not mark file as unavailable. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-log-file-validation-cli.html C- Since SSE-KMS is already given, there is no way the bucket is set as SSE-S3. D- S3 bucket for CloudTrail can be specified with any prefix without "CloudTrail/" https://docs.aws.amazon.com/awscloudtrail/latest/userguide/create-s3-bucket-policy-for-cloudtrail.html
upvoted 6 times
...
Raphaello
Most Recent 1 year, 4 months ago
Selected Answer: B
User won't be able to GET the object if permission does now allow decrypt. User will get access denied, not getting "unreadable" file!
upvoted 1 times
...
ITGURU51
2 years, 1 month ago
Since the security engineer is unable to view the files, he most likely doesn't have the right permissions to decrypt the data. B
upvoted 1 times
...
Balki
2 years, 7 months ago
Selected Answer: B
B for me as well
upvoted 1 times
...
dcasabona
2 years, 11 months ago
Selected Answer: B
I go on B as well.
upvoted 1 times
...
kiev
3 years, 8 months ago
B for me
upvoted 3 times
...
Larsson
3 years, 8 months ago
I did not know this but I answered B, because the other answers are unreasonable. The files can be placed anywhere and the files should be allowed for inspection if the failed validation.
upvoted 5 times
...
rdy4u
3 years, 8 months ago
B Duplicated with New Q19
upvoted 5 times
deegadaze1
3 years, 8 months ago
correct
upvoted 3 times
...
...
RajeshNayyar
3 years, 8 months ago
B is right answer, same question repeated again.
upvoted 2 times
...
richasskikr
3 years, 9 months ago
Enabling server-side encryption encrypts the log files but not the digest files with SSE-KMS. Digest files are encrypted with Amazon S3-managed encryption keys (SSE-S3). https://docs.aws.amazon.com/awscloudtrail/latest/userguide/encrypting-cloudtrail-log-files-with-aws-kms.html
upvoted 6 times
...
gfhbox0083
3 years, 9 months ago
B, for sure.
upvoted 1 times
...
AnilL
3 years, 9 months ago
I guess the questions are repeated from TOPIC1. KMS-managed keys (SSE-KMS) - Always digest files arent encrypted. so they are always readable.. but s3 encrypted data is not readable as THE POLICY ASSOCIATED TO THE IAM USER DOESNT PERMIT HIM TO DECRYPT THE CONTENT !!
upvoted 2 times
AnilL
3 years, 9 months ago
OR KMS ROLE DOESNT GRANT ACCESS TO THIS IAM USER !! ANSWER - B
upvoted 2 times
...
...
ADVIT
3 years, 9 months ago
I think it's D Digest files located in same Bucket and if they are readable so KMS permission is ok.
upvoted 2 times
...
Raj9
3 years, 9 months ago
b for me as well
upvoted 1 times
...
simplimarvelous
3 years, 9 months ago
B. D would be a good fit if it mentioned that access was denied, but it doesnt so presume that the object container can be opened but the objects inside cant be decrypted thus cant be read
upvoted 2 times
Ayusef
3 years, 8 months ago
Great point!
upvoted 1 times
...
skipbaylessfor3
3 years, 8 months ago
also its just that D seems less likely, B is a much more common scenario
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...