Learning
Learning
Loading practice session...
AWS Certified Security Specialty · Exam domain
54 practice questions in this domain. AI-tutored explanations for every answer.
Sign in to practice all 54 questions with progress tracking and AI explanations.
1. A security engineer discovers that an IAM access key has been publicly exposed in a GitHub repository. What is the FIRST action to take to limit damage?
Explanation
Deactivating/deleting the key immediately stops ongoing unauthorized use. Rotation (B) takes longer. Log review (C) is important but not the first step. MFA on root (D) doesn't address the exposed key.
2. After revoking a compromised IAM access key, which additional step BEST ensures the blast radius is fully understood and contained?
Explanation
A deny-all inline policy blocks active sessions that may still hold valid temporary tokens. Deleting the user (B) is too destructive and may lose audit data. SCPs (C) are unrelated. Shield (D) addresses DDoS, not key misuse.
3. A security team receives an AWS abuse notice indicating unauthorized API calls from an IAM role. Which CloudTrail feature allows them to quickly trace all actions taken by that specific role?
Explanation
CloudTrail Event History can be filtered by username or access key ID, directly surfacing every API call made by the compromised role. Config (B) tracks config changes, not API calls. VPC Flow Logs (C) show network traffic, not API actions. Trusted Advisor (D) doesn't log individual actions.
4. An investigator needs to determine whether a compromised access key was used to create new IAM users or escalate privileges. Which CloudTrail log field is MOST useful for identifying these specific actions?
Explanation
The 'eventName' field directly names the API action (e.g., CreateUser, AttachUserPolicy), making it the primary indicator of privilege escalation. Source IP (B) and userAgent (C) are useful context but don't identify the action. requestParameters (D) without eventName is incomplete.
5. AWS sends an abuse notice to an account owner indicating that an EC2 instance is participating in a DDoS attack. What is the required response timeframe to avoid account suspension?
Explanation
AWS expects a response within 24 hours to abuse notices to prevent account suspension. Delays beyond 24 hours risk suspension. AWS does not auto-restore instances (D), and 72-hour or 7-day windows (B, C) exceed the expected timeframe.
Practice all 54+ questions in this domain
Start free practice →