List of questions
Related questions
Question 289 - DBS-C01 discussion
A company has an Amazon Redshift cluster with database audit logging enabled. A security audit shows that raw SQL statements that run against the Redshift cluster are being logged to an Amazon S3 bucket. The security team requires that authentication logs are generated for use in an intrusion detection system (IDS), but the security team does not require SQL queries.
What should a database specialist do to remediate this issue?
A.
Set the parameter to true in the database parameter group.
B.
Turn off the query monitoring rule in the Redshift cluster's workload management (WLM).
C.
Set the enable_user_activity_logging parameter to false in the database parameter group.
D.
Disable audit logging on the Redshift cluster.
Your answer:
0 comments
Sorted by
Leave a comment first