AWS SAA Mock Exam 4 - Security & Compliance
📝 Exam Information
- Focus Areas: Security, Identity & Access Management, Compliance
- Duration: 130 minutes
- Questions: 65 questions
- Difficulty: Advanced
Question 1
A healthcare organization needs to store patient records in AWS while complying with HIPAA. The solution must ensure data encryption at rest, in transit, và audit all access. Which combination meets these requirements?
A) S3 với SSE-S3 + CloudTrail + VPC endpoints B) S3 với SSE-KMS + CloudTrail + S3 Access Logging + VPC endpoints C) EFS với encryption + CloudWatch Logs + IAM policies D) RDS với encryption + CloudTrail + VPC + Security Groups
Answer: B Explanation: SSE-KMS provides granular key management, CloudTrail audits API calls, S3 Access Logging tracks object access, VPC endpoints secure data transfer.
Question 2
A financial application requires that database administrators cannot view encrypted customer data in production. Which solution prevents privileged user access to sensitive data?
A) Use IAM policies để deny access to encrypted data B) Implement database-level encryption với application-managed keys C) Use AWS KMS với separate key policies for admins và applications D) Enable CloudHSM với client-side encryption before storing data
Answer: D Explanation: CloudHSM với client-side encryption ensures data is encrypted before reaching AWS services, preventing privileged user access.
Question 3
A company needs to share S3 objects với external partners for limited time periods. Partners should not have AWS accounts. Which solution provides secure, time-limited access?
A) Create IAM users cho each partner với temporary passwords B) Use S3 pre-signed URLs với expiration times C) Share S3 bucket policies với partner IP addresses D) Use Cognito Identity Pools cho temporary credentials
Answer: B Explanation: Pre-signed URLs provide temporary access to specific S3 objects without requiring AWS accounts or permanent credentials.
Question 4
An organization implements a multi-account strategy với AWS Organizations. They need to prevent any account from disabling CloudTrail logging. Which approach ensures this requirement?
A) Create IAM policies in each account denying CloudTrail modifications B) Use Service Control Policies (SCPs) to deny CloudTrail disable actions C) Configure CloudTrail với MFA delete protection D) Set up CloudWatch alarms cho CloudTrail modifications
Answer: B Explanation: SCPs provide centralized policy management across all accounts, can prevent CloudTrail disabling at organization level.
Question 5
A web application stores session data in DynamoDB. Sessions contain PII that must be encrypted. The application needs to search sessions by user attributes. Which solution maintains security while enabling search functionality?
A) Use DynamoDB encryption at rest với KMS keys
B) Implement client-side encryption với searchable encryption schemes
C) Use DynamoDB với field-level encryption + GSI on non-encrypted attributes
D) Store encrypted data in DynamoDB + metadata in separate encrypted table
Answer: C Explanation: Field-level encryption protects PII while allowing GSI searches on non-sensitive attributes that remain unencrypted.
Question 6
A company requires all EC2 instances to use approved AMIs và automatically remediate non-compliant instances. Which solution provides automated compliance enforcement?
A) AWS Config Rules + Lambda functions for remediation B) Systems Manager Compliance + CloudWatch Events C) Inspector + CloudFormation drift detection D) GuardDuty + Security Hub automatic responses
Answer: A Explanation: Config Rules detect AMI compliance violations, Lambda functions can automatically terminate và replace non-compliant instances.
Question 7
An application uses API Gateway với Lambda backend. Security requires that API calls are authenticated, authorized, và logged for audit purposes. Which solution provides comprehensive security?
A) API Gateway với API keys + CloudWatch Logs B) Cognito User Pools + Lambda authorizer + CloudTrail + WAF C) IAM roles + VPC endpoints + CloudWatch Logs D) Custom authentication + Application Load Balancer + S3 logging
Answer: B Explanation: Cognito provides authentication, Lambda authorizer enables custom authorization, CloudTrail audits API calls, WAF protects against attacks.
Question 8
A containerized application in ECS requires secrets management. Container tasks need database passwords và API keys without hardcoding credentials. Which solution provides secure secrets management?
A) Store secrets in environment variables với base64 encoding B) Use AWS Secrets Manager với IAM task roles C) Mount EFS volume với encrypted credential files D) Use Parameter Store với SecureString parameters + IAM task roles
Answer: D Explanation: Parameter Store SecureString provides encryption at rest, IAM task roles ensure least privilege access, automatic rotation available.
Question 9
A multi-tenant SaaS application stores customer data in separate S3 prefixes. Each customer should only access their own data. Which solution ensures tenant isolation?
A) Use separate S3 buckets cho each customer B) Implement S3 bucket policies với dynamic prefix conditions C) Use IAM roles với condition keys for S3 prefix access D) Create separate AWS accounts cho each customer
Answer: C Explanation: IAM roles với condition keys (like s3:ExistingObjectTag/TenantID) provide dynamic, scalable tenant isolation.
Question 10
A company needs to detect và respond to potential data exfiltration attempts from EC2 instances. The solution should monitor network traffic và automatically block suspicious activities. Which combination provides this capability?
A) VPC Flow Logs + CloudWatch Alarms + Security Groups
B) GuardDuty + EventBridge + Lambda + NACLs
C) WAF + Shield + CloudFront + API Gateway
D) Config + Systems Manager + Inspector + CloudTrail
Answer: B Explanation: GuardDuty detects suspicious network activities, EventBridge triggers automated responses, Lambda implements blocking via NACLs.
Question 11
A legacy application cannot be modified to use IAM roles but needs to access S3. The application runs on EC2 instances và requires rotating access keys for security. Which solution provides automated key rotation?
A) Use Instance profiles với automatic credential rotation B) Implement Lambda function để rotate IAM user access keys C) Use Secrets Manager với IAM user credentials + automatic rotation D) Configure Systems Manager để update application config files
Answer: C Explanation: Secrets Manager can store IAM user credentials và automatically rotate them, applications retrieve current credentials via API.
Question 12
A financial services company must ensure all data in transit between services is encrypted. The architecture includes ALB, EC2 instances, RDS, và ElastiCache. Which combination ensures end-to-end encryption?
A) HTTPS on ALB + HTTP to EC2 + SSL to RDS + TLS to ElastiCache B) HTTPS throughout + SSL/TLS for all database connections + Redis AUTH C) Certificate Manager certificates + VPC endpoints + encryption at rest D) Network Load Balancer + TLS passthrough + encrypted EBS volumes
Answer: B Explanation: HTTPS throughout ensures encrypted communication, SSL/TLS for databases, Redis AUTH adds authentication layer.
Question 13-35
[Additional security questions covering:] - Network security (VPC, Security Groups, NACLs) - Identity federation và SSO - Compliance frameworks (SOC, PCI DSS, GDPR) - Incident response và forensics - Data protection và privacy
Security Domain Breakdown
Identity & Access Management (25%)
- IAM best practices
- Cross-account access
- Federation scenarios
- Service-linked roles
Data Protection (25%)
- Encryption strategies
- Key management
- Data classification
- Privacy controls
Infrastructure Security (20%)
- Network security
- Compute security
- Perimeter defense
- Monitoring & logging
Incident Response (15%)
- Detection mechanisms
- Automated remediation
- Forensics capabilities
- Recovery procedures
Compliance (15%)
- Regulatory requirements
- Audit preparation
- Documentation
- Evidence collection
Key Security Principles
- Defense in depth
- Least privilege access
- Fail securely
- Security by design
- Automate security
Compliance Frameworks Covered
- HIPAA - Healthcare data protection
- PCI DSS - Payment card security
- SOX - Financial reporting controls
- GDPR - Data privacy regulation
- SOC 2 - Security controls audit
Study Focus Areas
- IAM policy evaluation logic
- Encryption implementation patterns
- Network security controls
- Logging và monitoring strategy
- Automated security responses
- Compliance requirement mapping