Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Amazon Exam SCS-C02 Topic 9 Question 38 Discussion

Actual exam question for Amazon's SCS-C02 exam
Question #: 38
Topic #: 9
[All SCS-C02 Questions]

A developer operations team uses AWS Identity and Access Management (1AM) to manage user permissions The team created an Amazon EC2 instance profile role that uses an AWS managed Readonly Access policy. When an application that is running on Amazon EC2 tries to read a file from an encrypted Amazon S3 bucket, the application receives an AccessDenied error.

The team administrator has verified that the S3 bucket policy allows everyone in the account to access the S3 bucket. There is no object ACL that is attached to the file.

What should the administrator do to fix the 1AM access issue?

Show Suggested Answer Hide Answer
Suggested Answer: B

Utilizing CloudFront signed cookies is the simplest and most effective way to protect HLS video content for paying subscribers. Signed cookies provide access control for multiple files, such as video chunks in HLS streaming, without the need to generate a signed URL for each video chunk. This method simplifies the process for long video events with thousands of chunks, enhancing user experience while ensuring content protection.


Contribute your Thoughts:

Fairy
1 months ago
I bet the administrator is wishing they had a magic 8-ball to tell them the right answer. Luckily, Option C is the clear choice here.
upvoted 0 times
Teddy
3 days ago
Verify that the application is using the correct credentials to access the S3 bucket.
upvoted 0 times
...
Valene
4 days ago
Update the EC2 instance profile role to include the necessary permissions for accessing encrypted S3 buckets.
upvoted 0 times
...
Cherri
8 days ago
Make sure the application has the correct permissions to access the S3 bucket.
upvoted 0 times
...
Berry
11 days ago
Check if the EC2 instance profile role has the necessary permissions.
upvoted 0 times
...
...
Donette
1 months ago
This is a classic case of 'the answer is always in the question'. The IAM role needs the KMS decrypt permission, so Option C is the correct answer. Easy peasy!
upvoted 0 times
...
Georgiann
1 months ago
Haha, looks like the administrator forgot to give the IAM role the right permissions. Option C is the way to fix this, no need to go messing with the S3 bucket policy.
upvoted 0 times
Markus
1 days ago
That makes sense, no need to mess with the S3 bucket policy then.
upvoted 0 times
...
Bulah
3 days ago
Yeah, attaching an inline policy with kms Decrypt permissions to the 1AM role should do the trick.
upvoted 0 times
...
Georgene
15 days ago
Option C is the best solution here.
upvoted 0 times
...
...
Elke
2 months ago
I'm pretty sure the S3 bucket policy is not the problem here. The IAM role needs the correct permissions to access the encrypted S3 object, which means we need to add the KMS decrypt action.
upvoted 0 times
Wilda
1 months ago
D: No, we need to focus on adding the decryption permissions to the IAM role.
upvoted 0 times
...
Dominga
1 months ago
C: Add the EC2 IAM role as the authorized Principal to the S3 bucket policy.
upvoted 0 times
...
Kiley
1 months ago
B: That makes sense, we need to allow decryption of the encrypted S3 object.
upvoted 0 times
...
Tien
1 months ago
A: Edit the ReadOnlyAccess policy to add kms:Decrypt actions.
upvoted 0 times
...
...
Dolores
2 months ago
Option C looks like the way to go. The issue is with the IAM role's permissions, so we need to add the necessary KMS permissions to that role.
upvoted 0 times
...
Olene
2 months ago
I'm not sure. Maybe attaching an inline policy with kms Decrypt permissions to the 1AM role could also work.
upvoted 0 times
...
Genevive
2 months ago
I agree with Remedios. Adding kms:Decrypt actions to the policy should fix the access issue.
upvoted 0 times
...
Remedios
2 months ago
I think the administrator should edit the ReadOnlyAccess policy to add kms:Decrypt actions.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77