Multiple Choice
The Security team believes that a former employee may have gained unauthorized access to AWS resources sometime in the past 3 months by using an identified access key. What approach would enable the Security team to find out what the former employee may have done within AWS?
A) Use the AWS CloudTrail console to search for user activity.
B) Use the Amazon CloudWatch Logs console to filter CloudTrail data by user.
C) Use AWS Config to see what actions were taken by the user.
D) Use Amazon Athena to query CloudTrail logs stored in Amazon S3.
Correct Answer:

Verified
Correct Answer:
Verified
Q4: A Security Administrator is configuring an Amazon
Q5: A company has hundreds of AWS accounts,
Q6: A developer is building a serverless application
Q7: A Security Engineer received an AWS Abuse
Q8: A company wants to deploy a distributed
Q10: A Security Administrator has a website hosted
Q11: A company's security engineer has been asked
Q12: A company has an application hosted in
Q13: A Software Engineer wrote a customized reporting
Q14: A company will store sensitive documents in