1. Right Answer: C
Explanation: Amazon Inspector offers a programmatic way to find security defects or misconfigurations in your operating systems and applications. Because you can use API calls to access both the processing of assessments and the results of your assessments, integration of the findings into workflow and notification systems is simple. DevOps teams can integrate Amazon Inspector into their CI/CD pipelines and use it to identify any pre-existing issues or when new issues are introduced. Option A,C and D are all incorrect since these services cannot check for Security Vulnerabilities. These can only be checked by the AWS(Amazon Web Service) Inspector service. For more information on AWS(Amazon Web Service) Security best practises, please refer to below URL https://d1.awsstatic.com/whitepapers/Security/AWS_Security_Best_Practices.pdf
2. Right Answer: D
Explanation:
3. Right Answer: D
Explanation: You need to ensure that an IAM service role is created for allowing the on-premise servers to communicate with the AWS(Amazon Web Service) Systems Manager. Option A is incorrect since it is not necessary that servers should only be running Hyper-V Options C and D are incorrect since it is not necessary that IAM users and groups are created For more information on the Systems Manager role please refer to the below url https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-service-role.html
4. Right Answer: D
Explanation: An example of this is given in the AWS(Amazon Web Service) Documentation Option A is invalid because giving public access is not a secure way to provide access Option C is invalid because aws:sites is not a valid condition key Option D is invalid because IAM roles will not be assigned to web sites For more information on example bucket policies please visit the below Link: https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html
5. Right Answer: A
Explanation: