Learning
Learning
Loading practice session...
AWS Certified Security Specialty · Exam domain
56 practice questions in this domain. AI-tutored explanations for every answer.
Sign in to practice all 56 questions with progress tracking and AI explanations.
1. A security architect needs to encrypt large datasets in S3 using AWS KMS. The design must minimize calls to KMS and avoid sending large payloads to the KMS API. Which envelope encryption approach is correct?
Explanation
Envelope encryption uses KMS to generate a data key, encrypts data locally with it, then discards the plaintext key — only the encrypted data key is kept. KMS CMKs cannot directly encrypt large payloads (4KB limit), making options B and C incorrect.
2. During decryption, an application retrieves an encrypted data key stored alongside a ciphertext blob in S3. What is the correct next step to decrypt the data?
Explanation
To decrypt, you call KMS Decrypt on the encrypted data key to get the plaintext data key, then decrypt locally. KMS cannot directly decrypt large ciphertexts (B is wrong), and the plaintext key must never be stored persistently (D is wrong).
3. A team is building a containerized microservice that encrypts data and passes the encrypted data key to a separate decryption service. The encryption container should never hold a plaintext key in memory. Which KMS API call should the encryption container use?
Explanation
GenerateDataKeyWithoutPlaintext returns only an encrypted data key — the container never sees plaintext, eliminating in-memory key exposure risk. GenerateDataKey (B) returns plaintext which defeats the purpose; direct CMK encryption (D) is limited to 4KB.
4. In a distributed pipeline, Worker A encrypts data using GenerateDataKeyWithoutPlaintext and stores the encrypted data key alongside the ciphertext. Worker B must decrypt the data later. What must Worker B have to successfully decrypt?
Explanation
Worker B must call KMS Decrypt on the encrypted data key, requiring kms:Decrypt permission on the specific CMK. KMS does not reproduce the same data key (B is wrong); S3 access alone is insufficient without KMS permissions (C is wrong).
5. A compliance officer requires full audit trails of all KMS key usage, the ability to set custom key rotation schedules, and the option to disable keys immediately if a breach is detected. Which CMK type meets all these requirements?
Explanation
Customer managed CMKs give full control: custom policies, configurable rotation (or manual rotation), enable/disable, and full CloudTrail visibility. AWS managed CMKs rotate automatically but cannot be disabled or have custom policies; AWS owned CMKs are invisible to customers.
Practice all 56+ questions in this domain
Start free practice →