ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 34 - SAA-C03 discussion

Report
Export

A company hosts its multi-tier applications on AWS. For compliance, governance, auditing, and security, the company must track configuration changes on its AWS resources and record a history of API calls made to these resources. What should a solutions architect do to meet these requirements?

A.
Use AWS CloudTrail to track configuration changes and AWS Config to record API calls
Answers
A.
Use AWS CloudTrail to track configuration changes and AWS Config to record API calls
B.
Use AWS Config to track configuration changes and AWS CloudTrail to record API calls
Answers
B.
Use AWS Config to track configuration changes and AWS CloudTrail to record API calls
C.
Use AWS Config to track configuration changes and Amazon CloudWatch to record API calls
Answers
C.
Use AWS Config to track configuration changes and Amazon CloudWatch to record API calls
D.
Use AWS CloudTrail to track configuration changes and Amazon CloudWatch to record API calls
Answers
D.
Use AWS CloudTrail to track configuration changes and Amazon CloudWatch to record API calls
Suggested answer: B

Explanation:

AWS Config is a fully managed service that allows the company to assess, audit, and evaluate the configurations of its AWS resources. It provides a detailed inventory of the resources in use and tracks changes to resource configurations. AWS Config can detect configuration changes and alert the company when changes occur. It also provides a historical view of changes, which is essential for compliance and governance purposes. AWS CloudTrail is a fully managed service that provides a detailed history of API calls made to the company's AWS resources. It records all API activity in the AWS account, including who made the API call, when the call was made, and what resources were affected by the call. This information is critical for security and auditing purposes, as it allows the company to investigate any suspicious activity that might occur on its AWS resources.


asked 16/09/2024
Filippo Panarella
24 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first