ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 289 - DBS-C01 discussion

Report
Export

A company has an Amazon Redshift cluster with database audit logging enabled. A security audit shows that raw SQL statements that run against the Redshift cluster are being logged to an Amazon S3 bucket. The security team requires that authentication logs are generated for use in an intrusion detection system (IDS), but the security team does not require SQL queries.

What should a database specialist do to remediate this issue?

A.
Set the parameter to true in the database parameter group.
Answers
A.
Set the parameter to true in the database parameter group.
B.
Turn off the query monitoring rule in the Redshift cluster's workload management (WLM).
Answers
B.
Turn off the query monitoring rule in the Redshift cluster's workload management (WLM).
C.
Set the enable_user_activity_logging parameter to false in the database parameter group.
Answers
C.
Set the enable_user_activity_logging parameter to false in the database parameter group.
D.
Disable audit logging on the Redshift cluster.
Answers
D.
Disable audit logging on the Redshift cluster.
Suggested answer: C
asked 16/09/2024
Javier Portabales
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first