1. Right Answer: D
Explanation: The first level or measure that should be taken is to delete the keys for the IAM root user When you log into your account and go to your Security Access dashboard , this is the first step that can be seen Option B and C are wrong because creation of IAM groups and roles will not change the impact of leakage of AWS(Amazon Web Service) root access keys Option D is wrong because the first key aspect is to protect the access keys for the root account For more information on best practises for Security Access keys, please visit the below URL https://docs.aws.amazon.com/general/latest/gr/aws-access-keys-best-practices.html
2. Right Answer: D
Explanation:
3. Right Answer: D
Explanation:
4. Right Answer: A
Explanation:
5. Right Answer: A
Explanation: The AWS(Amazon Web Service) Inspector service can inspect EC2 Instances based on specific Rules. One of the rules packages is based on the guidelines set by the Center of Internet Security Option A is invalid because this can be used to protect an instance but not give the list of vulnerabilities Option B and D are invalid because these services cannot give a list of vulnerabilities For more information on the guidelines, please visit the below URL https://docs.aws.amazon.com/inspector/latest/userguide/inspector_cis.html
Write a public review