Multiple Choice
A user should contact the AWS Abuse team to report which situations? (Choose two.)
A) A DDoS attack is being made on an AWS resource.
B) A SQL injection attack is being made from an IP address that is not an AWS address.
C) AWS resources are being used to host objectionable or illegal content.
D) A company's resources are being used in a way that is inconsistent with corporate policy.
E) A company is receiving HTTPS requests on a web server that is serving HTTP.
Correct Answer:

Verified
Correct Answer:
Verified
Q776: How can moving to the AWS Cloud
Q777: A company believes an unauthorized user copied
Q778: What does the AWS Cloud provide to
Q779: Which of the following is a shared
Q780: Which tool is best suited for combining
Q782: Which AWS service or feature is highly
Q783: What are the advantages of Reserved Instances?
Q784: Which AWS service can be used to
Q785: A database administrator is trying to determine
Q786: A company wants durable storage for static