A CHFI is analyzing suspicious activity on a company's AWS account. She suspects an unauthorized user accessed and deleted a crucial bucket object. To trace the potential perpetrator, she should primarily rely on the following:
A.
S3 Server Access logs to understand actions performed on a bucket object
B.
AWS CloudTrail logs to determine when and where the specific API calls were made
C.
Amazon CloudWatch logs to monitor system and application log data in real time
D.
Amazon VPC Flow Logs to scrutinize the IP traffic entering and leaving the specific VPC
AWS CloudTrail events can be viewed via AWS CloudTrail console which are stored in S3 buckets as log files, and delivered to Amazon CloudWatch
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Elb
6 months ago