exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 249 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 249
Topic #: 1
[All AWS Certified Security - Specialty Questions]

Amazon GuardDuty has detected communications to a known command and control endpoint from a company's Amazon EC2 instance. The instance was found to be running a vulnerable version of a common web framework. The company's security operations team wants to quickly identify other compute resources with the specific version of that framework installed.
Which approach should the team take to accomplish this task?

  • A. Scan all the EC2 instances for noncompliance with AWS Config. Use Amazon Athena to query AWS CloudTrail logs for the framework installation.
  • B. Scan all the EC2 instances with the Amazon Inspector Network Reachability rules package to identify instances running a web server with RecognizedPortWithListener findings.
  • C. Scan all the EC2 instances with AWS Systems Manager to identify the vulnerable version of the web framework.
  • D. Scan all the EC2 instances with AWS Resource Access Manager to identify the vulnerable version of the web framework.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Hungdv
Highly Voted 3 years, 8 months ago
C is answer
upvoted 23 times
grekh001
3 years, 8 months ago
This is the correct answer. The question asks for the specific version of the web framework. Port scanning a web server will only confirm that HTTP and HTTPS ports are open, not tell you what version of the web framework is installed. https://aws.amazon.com/systems-manager/ "you can use Systems Manager to create a resource group for the application and easily see the software installed on your Amazon EC2 instances" Correct answer is C
upvoted 6 times
...
...
DahMac
Highly Voted 3 years, 7 months ago
C. with Systems Manager Run command can do simple Linux or Windows commands to see software versions running, then grep or findstr for matches.
upvoted 5 times
...
Raphaello
Most Recent 1 year, 4 months ago
Selected Answer: C
My advice to myself and you: read it twice, think twice. Quickly. Inspector Network Reachability, as the name implies, check for network configuration to identifies security vulnerabilities. It does NOT use any agent on EC2 instances. "An Amazon Inspector Classic agent is not required to assess your EC2 instances with this rules package." Therefore, it CANNOT identify anything installed on EC2 instance. On the other hand SSM does not do "scans" in the term we might think of in this context, but it does provide INVENTORY of METADATA of apps installed and network config on EC2 instances, if configured. Does C as it is worded helps you consider it? No. But in the exam don't expect any help. Is C the best option? Yes. Through elimination and deep thinking, it is the best option.
upvoted 2 times
...
s50600822
1 year, 11 months ago
C, normally it would be Inspector. However, Amazon Inspector Network Reachability rules package is BS for the case.
upvoted 1 times
...
samCarson
2 years ago
Selected Answer: C
C. Scan all the EC2 instances with AWS Systems Manager to identify the vulnerable version of the web framework. Option C is the best approach as it allows the security operations team to scan all EC2 instances using AWS Systems Manager. They can leverage Systems Manager's inventory and configuration management capabilities to check the version of the web framework installed on each instance. This enables them to quickly identify instances running the vulnerable version and take necessary actions to remediate the issue. Options A, B, and D do not specifically focus on identifying the specific web framework version and may not provide the desired level of accuracy and efficiency in this scenario.
upvoted 1 times
...
ITGURU51
2 years, 2 months ago
The question states that the security engineer needs to find a specific vulnerable version of a common web framework. Amazon Inspector is not the answer here because it generated findings to tell us which ports are reachable from the internet. You can use Systems Manager Inventory to collect metadata from your managed instances. This metadata includes information about applications installed on your endpoints.
upvoted 1 times
...
nairj
2 years, 2 months ago
Answer is C since AWS SSM supports scanning EC2 instances for installed software by using the Inventory feature.
upvoted 1 times
...
boooliyooo
2 years, 5 months ago
Selected Answer: C
Option B, scanning all the EC2 instances with the Amazon Inspector Network Reachability rules package to identify instances running a web server with RecognizedPortWithListener findings, would not be an effective method for identifying instances running a vulnerable version of a web framework.
upvoted 2 times
...
rrshah83
2 years, 7 months ago
Selected Answer: B
inspector scans for vulnerabilities. Network scan will show the ports on which vulnerable process is listening...
upvoted 1 times
...
sapien45
2 years, 10 months ago
Selected Answer: C
AWS Systems Manager Inventory provides visibility into your AWS computing environment. You can use Inventory to collect metadata from your managed nodes. You can store this metadata in a central Amazon Simple Storage Service (Amazon S3) bucket, and then use built-in tools to query the data and quickly determine which nodes are running the software and configurations required by your software policy, and which nodes need to be updated. You can configure Inventory
upvoted 2 times
...
Alexey79
3 years, 1 month ago
Selected Answer: C
C: “instance was running a vulnerable version of a popular web framework”. To identify Version of the Framework / Application use SSM Agent. https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-inventory.html “ The following table describes the types of data you can collect with Systems Manager Inventory. … You can configure Inventory to collect the following types of data: Applications: Application names, publishers, versions, etc. “ Why NOT A: AWS Config is for the Compliance of the AWS Resources. Why NOT B: AWS Inspector can recognize only RecognizedPortWithListener, not if the listener version is vulnerable. A recognized port is externally reachable from the public internet through a specific networking component, and a process is listening on the port.
upvoted 2 times
...
LaLune
3 years, 5 months ago
The vulnerability in the web framework (application) here has been already identified using GuardDuty. "Using AWS System Manager, you can discover applications, view operations data (e.g. deployment status, Amazon CloudWatch Alarms, resource configurations, and operational issues), and perform remedial actions in the context of an application. You can request operational changes using predefined approval workflows and audit each change after it has been completed. You can then view detailed system configurations, operating system patch levels, software installations, application configurations, and other details about your environment through the System Manager Explorer and Inventory Dashboards." Ebook: “Threat Hunting in the Cloud”: Defending AWS, Azure, and other Cloud Platform Against Cyberattacks; by Chris Peiris, Binil Pillai, Abbas Kudrati. It is clear that the easy path to the Question requirement is option C.
upvoted 1 times
...
HananS
3 years, 7 months ago
https://aws.amazon.com/about-aws/whats-new/2020/10/now-use-aws-systems-manager-to-view-vulnerability-identifiers-for-missing-patches-on-your-linux-instances/ Answer is C
upvoted 1 times
...
Syeda123
3 years, 7 months ago
The correct answer is B or C?
upvoted 2 times
...
DerekKey
3 years, 7 months ago
C should be CORRECT - collect data about applications, files, Windows services, registries, updates, and any other system properties -> application assets, applications not installed by a traditional installer, and more B should be WRONG First run Inspector and review report that it generates. If you have never done that check: https://aws.amazon.com/blogs/security/amazon-inspector-assess-network-exposure-ec2-instances-aws-network-reachability-assessments/ https://cloudog.pl/wp-content/uploads/2019/02/0-NBPhwjEc-finding-report.pdf
upvoted 2 times
...
Ponzy
3 years, 7 months ago
B: is the answer 100% because Amazon Inspector's primary purpose is conduct detailed CVE and the question asks for that in another way. SSM has that capability but limited to missing patches. We should go for the best answer: B
upvoted 3 times
...
Ayusef
3 years, 8 months ago
Its B..see Daniels explanation.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...