Learning
Learning
Loading practice session...
AWS Certified Security Specialty · Exam domain
56 practice questions in this domain. AI-tutored explanations for every answer.
Sign in to practice all 56 questions with progress tracking and AI explanations.
1. A security engineer wants to automatically trigger an AWS Lambda function whenever an IAM policy is changed, to audit configuration drift in real time. Which AWS service combination is the MOST appropriate solution?
Explanation
CloudWatch Events (EventBridge) rules can match IAM API calls recorded by CloudTrail in near-real time and route them to Lambda targets immediately. Alarms require metric thresholds, CloudTrail alone cannot invoke Lambda, and Insights queries are not event-driven.
2. A team sets up a CloudWatch Alarm to detect brute-force login attempts by monitoring a metric filter on failed SSH login log entries. The alarm triggers an SNS notification. After deployment, no alerts are received despite verified failed logins. What is the MOST likely cause?
Explanation
If the metric filter publishes to a different namespace or metric name than the alarm monitors, the alarm receives no data and never triggers. Options A and D are secondary concerns; Option B is false—alarms do support custom log-based metrics.
3. A compliance team must receive an immediate alert whenever the AWS root account is used for any API call. Which CloudWatch configuration achieves this MOST directly?
Explanation
The RootAccountUsage filter pattern on a CloudTrail-backed CloudWatch Logs metric filter is the AWS-documented approach to detect root API usage and trigger alarms. Config and GuardDuty work but are indirect; a broad IAM rule with Lambda filtering adds unnecessary complexity.
4. Which CloudWatch metric filter pattern correctly identifies root account API activity from CloudTrail logs delivered to a CloudWatch Logs log group?
Explanation
The AWS-recommended RootAccountUsage pattern excludes service-initiated events (invokedBy NOT EXISTS, eventType != AwsServiceEvent) to reduce noise while capturing real root user actions. Option B matches on ARN which is less reliable; C only catches IAM events; D causes false positives.
5. A developer's IAM role has a policy granting 'cloudwatch:PutMetricData' but they cannot publish metrics to a custom namespace. A security review reveals the CloudWatch namespace has no resource-based policy. What is the MOST accurate explanation?
Explanation
CloudWatch namespaces do not support resource-based policies; access is governed solely by identity-based IAM policies on the calling principal. If the identity policy grants PutMetricData, the issue lies elsewhere (e.g., condition keys or permission boundaries), not a missing resource-based policy.
Practice all 56+ questions in this domain
Start free practice →