exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 1 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 1
Topic #: 1
[All AWS Certified Security - Specialty Questions]

The Security team believes that a former employee may have gained unauthorized access to AWS resources sometime in the past 3 months by using an identified access key.
What approach would enable the Security team to find out what the former employee may have done within AWS?

  • A. Use the AWS CloudTrail console to search for user activity.
  • B. Use the Amazon CloudWatch Logs console to filter CloudTrail data by user.
  • C. Use AWS Config to see what actions were taken by the user.
  • D. Use Amazon Athena to query CloudTrail logs stored in Amazon S3.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
josellama2000
Highly Voted 3 years, 7 months ago
Use the AWS CloudTrail event history to identify AWS API activity in the last 90 days for your IAM access key. ref- https://aws.amazon.com/premiumsupport/knowledge-center/cloudtrail-search-for-activity/
upvoted 33 times
...
[Removed]
Highly Voted 8 months ago
A is correct answer.
upvoted 10 times
...
VinArc
Most Recent 7 months, 1 week ago
D is correct to fetch logs older than 3 months and easlity apply filter for specific employee
upvoted 1 times
...
Raphaello
1 year, 1 month ago
Selected Answer: A
A is correct.
upvoted 1 times
...
Maffo102
1 year, 5 months ago
Selected Answer: A
The interest period is 90 days, then you can simply query logs from AWS Cloudtrail
upvoted 1 times
...
Benah
1 year, 7 months ago
Use the AWS Cloud Trail console to search for user activity.
upvoted 1 times
...
Japanese1
1 year, 8 months ago
I think the answer is A. But everyone who says the answer is A is making a false claim. Because even logs from the past 3 months can be queried with S3 + Athena. I wonder if someone can give me a good explanation.
upvoted 1 times
...
habros
1 year, 8 months ago
Selected Answer: A
Within 3 months: CloudTrail querying Beyond 3 months: CloudTrail + S3, query using Athena
upvoted 3 times
...
realdandy
1 year, 9 months ago
Selected Answer: D
A is not an answer for this question because this way is to view activities of existing users. For former employee, Cloudtrail logs should be saved in storage like S3 and can be viewed by using query tools like Athena. Therefore the answer is D, I'm sure.
upvoted 1 times
...
OCHT
1 year, 11 months ago
Selected Answer: D
D. Amazon Athena is a serverless, interactive query service that integrates with S3 and uses standard SQL to analyze data. Athena can be used to query large amounts of CloudTrail data stored in S3, making it an excellent choice for this scenario. Remember the key point that Amazon Athena is used for interactive, ad-hoc querying of data stored in Amazon S3 using standard SQL. It is particularly useful when dealing with large datasets and historical data, such as CloudTrail logs spanning several months.
upvoted 1 times
...
ITGURU51
1 year, 11 months ago
The Security team can use the AWS CloudTrail console to search for user activity and identify what the former employee may have done within AWS. CloudTrail is a service that records AWS API calls and events for your account and delivers log files to an Amazon S3 bucket that you specify.
upvoted 2 times
...
Kitman
1 year, 11 months ago
Selected Answer: A
A for sure.
upvoted 1 times
...
KVK16
2 years, 3 months ago
Selected Answer: A
The key is without any configuration by DEFAULT By Default only CloudTrail is logged A. Paste the Specific Access Key ID in Search bar for Access Key lookup. Other attributes to search in Cloud Trail Events History -Event ID, Source , Resource Name , Resource Type ,Username Athena on Cloudtrail is also good but little time taking - need to create a Athena table and query it A. Best for unusual activity form baseline - Cloud watch insights. B. Config - Resource configuration changes are logged but Access key is not one C. Athena on S3 - Cloudtrail need to be configured to push logs to S3 , after 90days good idea
upvoted 3 times
...
janvandermerwer
2 years, 5 months ago
Selected Answer: A
A for sure
upvoted 1 times
...
SonNguy3n
2 years, 8 months ago
Selected Answer: A
The answer is A: You can search the behavior of users in the Event History of the CloudTrails console
upvoted 1 times
...
tezawynn
3 years, 1 month ago
I think D makes more sense, when you need to query 3 months worth of logs from Cloudtrail
upvoted 1 times
...
tipzzz
3 years, 6 months ago
https://docs.aws.amazon.com/athena/latest/ug/cloudtrail-logs.html
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago