Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam AWS Certified SysOps Administrator - Associate All Questions

View all questions & answers for the AWS Certified SysOps Administrator - Associate exam

Exam AWS Certified SysOps Administrator - Associate topic 1 question 58 discussion

A SysOps administrator must manage the security of an AWS account. Recently, an IAM user's access key was mistakenly uploaded to a public code repository.
The SysOps administrator must identify anything that was changed by using this access key.
How should the SysOps administrator meet these requirements?

  • A. Create an Amazon EventBridge (Amazon CloudWatch Events) rule to send all IAM events to an AWS Lambda function for analysis.
  • B. Query Amazon EC2 logs by using Amazon CloudWatch Logs Insights for all events initiated with the compromised access key within the suspected timeframe.
  • C. Search AWS CloudTrail event history for all events initiated with the compromised access key within the suspected timeframe.
  • D. Search VPC Flow Logs for all events initiated with the compromised access key within the suspected timeframe.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
kati2k22cz
Highly Voted 2 years, 2 months ago
Selected Answer: C
C "You can troubleshoot operational and security incidents over the past 90 days in the CloudTrail console by viewing Event history." https://docs.aws.amazon.com/awscloudtrail/latest/userguide/view-cloudtrail-events.html
upvoted 10 times
...
gehadg
Most Recent 2 weeks, 1 day ago
AWS CloudTrail records all API activity in an AWS account, including actions taken by IAM users and their access keys. By using CloudTrail, the SysOps administrator can track exactly what actions were performed with the compromised access key, including changes to resources or account configurations, and view a detailed log of events within the specified timeframe. Other Options: Option A: Creating an EventBridge (formerly CloudWatch Events) rule for IAM events would not provide historical data about the actions already taken with the compromised key. This setup would only capture future IAM events. Option B: CloudWatch Logs Insights does not provide logs of all actions taken by IAM users and access keys across services. It is mainly used for querying logs stored in CloudWatch, such as application logs. Option D: VPC Flow Logs track network traffic but do not log specific API actions, making them unsuitable for identifying API events or actions taken with an IAM access key. Correct Answer: C
upvoted 3 times
...
jipark
1 year, 3 months ago
Selected Answer: C
"all event" is key word for answer.
upvoted 1 times
jipark
1 year, 3 months ago
sorry for mistype - for all event of CloudTrail (not EC2 log)
upvoted 1 times
...
...
BietTuot
1 year, 11 months ago
Selected Answer: C
answer is C.
upvoted 1 times
...
michaldavid
1 year, 11 months ago
Selected Answer: C
ccccccc
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...