exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 59 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 59
Topic #: 1
[All AWS Certified Security - Specialty Questions]

An employee accidentally exposed an AWS access key and secret access key during a public presentation. The company Security Engineer immediately disabled the key.
How can the Engineer assess the impact of the key exposure and ensure that the credentials were not misused? (Choose two.)

  • A. Analyze AWS CloudTrail for activity.
  • B. Analyze Amazon CloudWatch Logs for activity.
  • C. Download and analyze the IAM Use report from AWS Trusted Advisor.
  • D. Analyze the resource inventory in AWS Config for IAM user activity.
  • E. Download and analyze a credential report from IAM.
Show Suggested Answer Hide Answer
Suggested Answer: AE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ugreenhost
Highly Voted 3 years, 7 months ago
A & E is correct For E - (https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html) "f your users use access keys to access AWS programmatically you can refer to access key last used information because it is accurate for all dates."
upvoted 43 times
...
josellama2000
Highly Voted 3 years, 7 months ago
Agreed, A and E are correct. All activities of an IAM user can be monitored using aws cloudtrail.
upvoted 17 times
yd_h
2 years ago
Not all activities. only the activities that interacted with the AWS public API can be monitored using CloudTrail. As such, SSH in to a instance will not be recorded in CloudTrail
upvoted 1 times
...
...
Raphaello
Most Recent 1 year, 2 months ago
Selected Answer: AB
"assess the impact of the key exposure" A. CloudTrail will help assessing impact through reviewing API calls issued. B. CloudWatch Logs will help assessing impact through reviewing activities made. E. IAM report will show only details about CREDENTIALS. Won't help with assessing impact ofc. Answers AB are correct.
upvoted 1 times
...
ITGURU51
1 year, 11 months ago
A- Use Cloudtrail for visibility into user behaviors and API activity. E- You can use AWS Identity and Access Management (IAM) credential reports to help you meet the security, auditing, and compliance requirements of your organization. Credential reports provide a list of all the users in your AWS accounts and show the status of their credentials, such as passwords, access keys, and multi-factor authentication (MFA) devices.
upvoted 3 times
...
swrp4595
2 years, 2 months ago
Selected Answer: AB
Question specifically mentions assess the impact of key exposure and ensure credentials were not misused. Option E might give the last accessed but doesn't satisfy what the question is asking.
upvoted 3 times
...
GaniGaniGani
2 years, 4 months ago
Selected Answer: AD
With E only see last access, you don't see event details and what the user performed is not there. So the answer it A and D. Report is batch process.
upvoted 1 times
...
hubekpeter
2 years, 5 months ago
Selected Answer: AB
A. yes - you can get api/caller identity historically B. yes - cloud watch insights, simple tool to do basic query and export C. AWS Trusted Advisor - no, as you can't get a credential report D. AWS Config for IAM user activity - again, it's not possible to get a report E. credential report from IAM - yed, but you can see when a cred was used last, which is not helpfull in this case
upvoted 3 times
...
knc
2 years, 6 months ago
Selected Answer: AD
A - obvious Between D & E: I would go for D as it provides details of missuse via change in resource detected in AWS Config. E- Just provides use of the key by someone but not indicate missuse.
upvoted 1 times
boooliyooo
2 years, 5 months ago
Having to say that you can't determine from Config if it's misused too. They could have just run around 'reading' or 'exporting' data which is totally normal. but E, you can at least know their presence in the area
upvoted 1 times
...
...
Root_Access
2 years, 7 months ago
Selected Answer: AE
A is obvious, for E, here are some info you can get from the report: access_key_1_last_used_date The date and time, in ISO 8601 date-time format, when the user's access key was most recently used to sign an AWS API request. When an access key is used more than once in a 15-minute span, only the first use is recorded in this field. access_key_1_last_used_service The AWS service that was most recently accessed with the access key. The value in this field uses the service's namespace—for example, s3 for Amazon S3 and ec2 for Amazon EC2. When an access key is used more than once in a 15-minute span, only the first use is recorded in this field.
upvoted 4 times
Raphaello
1 year, 1 month ago
"The value in this field uses the service's namespace—for example, s3 for Amazon S3 and ec2 for Amazon EC2. When an access key is used more than once in a 15-minute span, only the first use is recorded in this field." Hardly showing the impact!
upvoted 1 times
...
...
dcasabona
2 years, 9 months ago
Selected Answer: AE
I choose options A and E.
upvoted 3 times
...
lotfi50
2 years, 10 months ago
Selected Answer: AE
A & E is correct E: it wloud provide the last accessed time
upvoted 4 times
...
jackfei
2 years, 11 months ago
A * E is correct
upvoted 1 times
...
TigerInTheCloud
3 years ago
Selected Answer: AD
I do A and D for this kind of incident, use A for quick identifying what the key is used for; D for easy viewing the details of what has been changed (will A should reveal the changes too but a little bit harder to read) E. does not very useful for this situation B. CouldWatch is not for API call auditing. C. Tresterd Advisor does not provide such report.
upvoted 1 times
TigerInTheCloud
3 years ago
B. CloudTrail log can be sent to CloudWatch log, but does not provide more information than CloudTrail for the incident less than 90 days older.
upvoted 1 times
...
...
lotfi50
3 years, 2 months ago
Selected Answer: AE
Correct answers are A and E
upvoted 3 times
...
ideoignus
3 years, 2 months ago
Selected Answer: AD
extent of the key exposure's effect confirm that the credentials were not misused Means, if there are resources changed, it must be discovered. If any data is accessed, it must be identified A, D E - will not give details on misuse. Only details last used, what if multiple people used it, as it publicly exposed.
upvoted 2 times
...
Radhaghosh
3 years, 3 months ago
AWS Credentials report will give when the Key was last used and from which region. But CloudWatch Log Insight& CloudTrail will give the activity history. Refer this link https://aws.amazon.com/premiumsupport/knowledge-center/view-iam-history/ Correct Answer A & B
upvoted 1 times
...
dumma
3 years, 5 months ago
A&B are right
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago