exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 72 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 72
Topic #: 1
[All AWS Certified Security - Specialty Questions]

During a security event, it is discovered that some Amazon EC2 instances have not been sending Amazon CloudWatch logs.
Which steps can the Security Engineer take to troubleshoot this issue? (Choose two.)

  • A. Connect to the EC2 instances that are not sending the appropriate logs and verify that the CloudWatch Logs agent is running.
  • B. Log in to the AWS account and select CloudWatch Logs. Check for any monitored EC2 instances that are in the ג€Alertingג€ state and restart them using the EC2 console.
  • C. Verify that the EC2 instances have a route to the public AWS API endpoints.
  • D. Connect to the EC2 instances that are not sending logs. Use the command prompt to verify that the right permissions have been set for the Amazon SNS topic.
  • E. Verify that the network access control lists and security groups of the EC2 instances have the access to send logs over SNMP.
Show Suggested Answer Hide Answer
Suggested Answer: AC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Ayusef
Highly Voted 3 years, 7 months ago
A and C are correct..https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/cloudwatch-logs-and-interface-VPC.html
upvoted 13 times
vnsuk
3 years, 6 months ago
what has vpc endpoint got to do with ec2 instance sending logs to cloudwatch which is native to aws?
upvoted 2 times
Daniel76
3 years, 6 months ago
"If you use Amazon Virtual Private Cloud (Amazon VPC) to host your AWS resources, you can establish a private connection between your VPC and CloudWatch Logs. You can use this connection to send logs to CloudWatch Logs without sending them through the internet." Hence, without a private connection through a interface VPC endpoint, even though CloudWatch is native service you still have to route it through internet API call via an internet gateway.
upvoted 7 times
...
...
...
sanjaym
Highly Voted 3 years, 6 months ago
Ans: AC
upvoted 7 times
...
Arad
Most Recent 11 months, 1 week ago
Selected Answer: AC
I think AC is correct answer.
upvoted 2 times
...
Arad
11 months, 3 weeks ago
Selected Answer: AC
I believe AC is correct.
upvoted 1 times
...
liuyomz
1 year, 9 months ago
Selected Answer: AB
Theres no need to add a route to AWS API from EC2
upvoted 4 times
...
matrpro
2 years ago
Selected Answer: AC
A and C are the correct ones. However, as usual, we are not sure about the more correct options. In this case, we have to discard B because the "alerting state" doe s exist. https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_InstanceState.html
upvoted 1 times
...
zeeke
2 years, 3 months ago
Selected Answer: AB
If C were correct, they would all be having issues because they all share the same route table.
upvoted 4 times
...
whichonce
2 years, 4 months ago
Selected Answer: AC
no way B!!!!
upvoted 3 times
...
hubekpeter
2 years, 5 months ago
Selected Answer: AB
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/monitoring-system-instance-status-check.html There's ongoing instance status check, you can get a memory leak which in turn can cause kernel panic, so you end up without running CloudWatch agent. With C - all the instances will be affected as you are attaching routing tables directly on subnets instad of VMs, that doesn't make sense.
upvoted 5 times
...
dcasabona
2 years, 9 months ago
Selected Answer: AC
I go for A and C as well.
upvoted 4 times
...
TigerInTheCloud
3 years, 1 month ago
Selected Answer: AC
only A C make sense.
upvoted 4 times
...
Radhaghosh
3 years, 3 months ago
A. Connect to the EC2 instances that are not sending the appropriate logs and verify that the CloudWatch Logs agent is running. C. Verify that the EC2 instances have a route to the public AWS API endpoints.
upvoted 3 times
...
kiev
3 years, 6 months ago
correct, A and C for me as well
upvoted 3 times
...
ChauPhan
3 years, 6 months ago
D, E SNS topic and SNMP are not relevant. B. There is no such EC2 "Alert" state. => A, C CloudWatch agents will connect to AWS CloudWatch Logs service by internet through CloudWatch Public API endpoint, except you reconfigure private endpoint.
upvoted 4 times
...
eskimolander
3 years, 6 months ago
Why not B? The status of the EC2 alarm might be indicating that there is a problem with that instance that was being monitored. C has nothing to do with an EC2 instance. The link of VPC mentioned is to log VPC with Cloudwatch and is also not related to EC2. Also there is the word "Some" indicating that not all EC2 are affected. I think A&B are correct.
upvoted 4 times
alghoundar
3 years, 3 months ago
It`s a distractor. first there`s no alerting state for ec2. second the ec2 is not sending logs to cloudwatch so how could we see it`s state in cloudwatch console?.
upvoted 2 times
...
ChauPhan
3 years, 6 months ago
There is no such EC2 "Alerting" state, EC2 state is terminated, stopped, running, stopping etc
upvoted 6 times
...
...
Hungdv
3 years, 7 months ago
A and C
upvoted 4 times
...
Edgecrusher77
3 years, 7 months ago
Yes A & C are correct
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago