1. Right Answer: B
Explanation:
2. Right Answer: A
Explanation: Given the current requirements, assume the method of 'least privilege' security design and only allow the auditor access to the minimum amount of AWS(Amazon Web Service) resources as possible. AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS(Amazon Web Service) account. With CloudTrail, you can log, continuously monitor, and retain events related to API calls across your AWS(Amazon Web Service) infrastructure. CloudTrail provides a history of AWS(Amazon Web Service) API calls for your account, including API calls made through the AWS(Amazon Web Service) Management Console, AWS(Amazon Web Service) SDKs, command line tools, and other AWS(Amazon Web Service) services. This history simplifies security analysis, resource change tracking, and troubleshooting Option A is incorrect since the auditor should only be granted access in one location Option B is incorrect since consolidated billing is not a key requirement as part of the question Option C is incorrect since there is not consolidated logging For more information on Cloudtrail please refer to the below url https://aws.amazon.com/cloudtrail/
3. Right Answer: A
Explanation: The AWS(Amazon Web Service) Documentation mentions the following You can quickly remediate patch and association compliance issues by using Systems Manager Run Command. You can target either instance IDs or Amazon EC2 tags and execute the AWS-RefreshAssociation document or the AWS-RunPatchBaseline document. If refreshing the association or re-running the patch baseline fails to resolve the compliance issue, then you need to investigate your associations, patch baselines, or instance configurations to understand why the Run Command executions did not resolve the problem Options A and B are invalid because even though this is possible , still from a maintenance perspective it would be difficult to maintain the Lambda functions Option C is invalid because this service cannot be used to patch servers For more information on using Systems Manager for compliance remediation please visit the below Link: https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-compliance-fixing.html
4. Right Answer: B,D
Explanation: The AWS(Amazon Web Service) Documentation mentions the following All AWS(Amazon Web Service) accounts have root user credentials (that is, the credentials of the account owner). These credentials allow full access to all resources in the account. Because you can't restrict permissions for root user credentials, we recommend that you delete your root user access keys. Then create AWS(Amazon Web Service) Identity and Access Management (IAM) user credentials for everyday interaction with AWS. Option A is incorrect since you cannot delete the root access account. Option C is partially correct but cannot be used as the ideal solution for safeguarding the account For more information on root access vs admin IAM users, please refer to below URL https://docs.aws.amazon.com/general/latest/gr/root-vs-iam.html
5. Right Answer: B,D
Explanation:
Leave a comment