List of questions
Related questions
Question 533 - SCS-C01 discussion
A company's security information events management (SIEM) tool receives new AWS CloudTrail logs from an Amazon S3 bucket that is configured to send all object created event notification to an Amazon SNS topic An Amazon SQS queue is subscribed to this SNS topic. The company's SEM tool then ports this SQS queue for new messages using an IAM role and fetches new log events from the S3 bucket based on the SQS messages. After a recent security review that resulted m restricted permissions, the SEM tool has stopped receiving new CloudTral logs Which of the following are possible causes of this issue? (Select THREE)
A.
The SOS queue does not allow the SQS SendMessage action from the SNS topic
B.
The SNS topic does not allow the SNS Publish action from Amazon S3
C.
The SNS topic is not delivering raw messages to the SQS queue
D.
The S3 bucket policy does not allow CloudTrail to perform the PutObject action
E.
The IAM role used by the 5EM tool does not have permission to subscribe to the SNS topic
F.
The IAM role used by the SEM tool does not allow the SQS DeleteMessage action.
Your answer:
0 comments
Sorted by
Leave a comment first