nerdexam
AmazonAmazon

SCS-C02 · Question #439

SCS-C02 Question #439: Real Exam Question with Answer & Explanation

The correct answer is B: Designate a delegated Amazon Inspector administrator account in the organization's. Amazon Inspector is a service designed to automatically scan and continuously monitor AWS Lambda functions for vulnerabilities. By designating a delegated Amazon Inspector administrator account, you can centrally manage vulnerability scanning and view the findings across all acco

Submitted by anna_se· Mar 6, 2026

Question

A company uses AWS Lambda functions to implement application logic. The company uses an organization in AWS Organizations to manage hundreds of AWS accounts. The company needs to implement a solution to continuously monitor the Lambda functions for vulnerabilities in all accounts. The solution must publish detected issues to a dashboard. Lambda functions that are being tested or are in development must not appear on the dashboard. Which combination of steps will meet these requirements? (Choose two.)

Options

  • ADesignate a delegated Amazon GuardDuty administrator account in the organization's
  • BDesignate a delegated Amazon Inspector administrator account in the organization's
  • CApply tags of "test" or "development" to all Lambda functions that are in testing or development.
  • DEnable AWS Shield Advanced in the organization's management account. Use Amazon
  • EEnable Lambda Protection in GuardDuty for all accounts. Auto-enable Lambda Protection for new

Explanation

Amazon Inspector is a service designed to automatically scan and continuously monitor AWS Lambda functions for vulnerabilities. By designating a delegated Amazon Inspector administrator account, you can centrally manage vulnerability scanning and view the findings across all accounts using the Amazon Inspector dashboard. This dashboard provides an overview of vulnerabilities affecting Lambda functions. To exclude Lambda functions in testing or development stages from appearing on the dashboard, you can apply tags such as "test" or "development" to these Lambda functions. By creating a suppression filter, you can suppress findings based on these tags, ensuring that only production Lambda functions are included in the vulnerability findings reported on the dashboard.

Community Discussion

No community discussion yet for this question.

Full SCS-C02 PracticeBrowse All SCS-C02 Questions