1. Right Answer: A,B
Explanation: The AWS(Amazon Web Service) Documentation mentions the following about these services AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS(Amazon Web Service) account. With CloudTrail, you can log, continuously monitor, and retain account activity related to actions across your AWS(Amazon Web Service) infrastructure. CloudTrail provides event history of your AWS(Amazon Web Service) account activity, including actions taken through the AWS(Amazon Web Service) Management Console, AWS(Amazon Web Service) SDKs, command line tools, and other AWS(Amazon Web Service) services. This event history simplifies security analysis, resource change tracking, and troubleshooting. Option B is invalid because this is only used for VPC's Option C is invalid because this is a configuration service and cannot be used for logging purposes For more information on Cloudtrail, please refer to below URL https://aws.amazon.com/cloudtrail/
2. Right Answer: D
Explanation: With VPC Flow logs you can get the list of IP addresses which are hitting the Instances in your VPC. You can then use the information in the logs to see which external IP addresses are sending a flurry of requests which could be the potential threat for a DDos attack. Option B is invalid this is an API monitoring service and will not be able to get the IP addresses Option C is invalid this is a config service and will not be able to get the IP addresses Option D is invalid because this is a recommendation service and will not be able to get the IP addresses For more information on VPC Flow Logs, please visit the following url https://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/flow-logs.html
3. Right Answer: B,D
Explanation: The AWS(Amazon Web Service) Documentation mentions the following Option B is invalid because just enabling bucket versioning will not guarantee replication of objects Option D is invalid because the condition for the bucket policy needs to be set accordingly For more information on example bucket policies, please visit the following url https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html Also versioning and Cross Region replication can ensure that objects will be available in the destination region in case the primary region fails. For more information on CRR, please visit the following url https://docs.aws.amazon.com/AmazonS3/latest/dev/crr.html
4. Right Answer: A
Explanation: To always ensure secure access to AWS(Amazon Web Service) resources from EC2 Instances, always ensure to assign a Role to the EC2 Instance Option B is invalid because KMS keys are not used as a mechanism for providing EC2 Instances access to AWS(Amazon Web Service) services. Option C is invalid Access keys is not a safe mechanism for providing EC2 Instances access to AWS(Amazon Web Service) services. Option D is invalid because there is no way access groups can be assigned to EC2 Instances. For more information on IAM Roles, please refer to the below URL https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html
5. Right Answer: C
Explanation:
Leave a comment