ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 684 - CLF-C02 discussion

Report
Export

An administrator observed that multiple AWS resources were deleted yesterday.

Which AWS service will help identify the cause and determine which user deleted the resources?

A.
AWS CtoudTrail
Answers
A.
AWS CtoudTrail
B.
Amazon Inspector
Answers
B.
Amazon Inspector
C.
Amazon GuardDuty
Answers
C.
Amazon GuardDuty
D.
AWS Trusted Advisor
Answers
D.
AWS Trusted Advisor
Suggested answer: A

Explanation:

AWS CloudTrail is a service that enables governance, compliance, and operational and risk auditing of your AWS account. With CloudTrail, you can log, continuously monitor, and retain account activity related to actions across your AWS infrastructure. CloudTrail logs provide a history of AWS API calls for your account, including those made by the AWS Management Console, AWS SDKs, command-line tools, and other AWS services. In this case, AWS CloudTrail will help the administrator identify which user deleted the resources by reviewing the event history that records details such as which user performed the action, the time of the action, and which resources were affected.

B . Amazon Inspector: Incorrect, as it is a security assessment service that helps identify vulnerabilities and deviations from best practices, not for tracking user activity.

C . Amazon GuardDuty: Incorrect, as it is a threat detection service that monitors malicious activity and unauthorized behavior, not specifically for tracking changes made by users.

D . AWS Trusted Advisor: Incorrect, as it provides best practices and guidance for cost optimization, security, fault tolerance, and performance, not for logging user actions.

AWS Cloud References:

AWS CloudTrail

asked 16/09/2024
Jason Kelley
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first