exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 121 discussion

Actual exam question from CompTIA's CS0-002
Question #: 121
Topic #: 1
[All CS0-002 Questions]

While conducting a cloud assessment, a security analyst performs a Prowler scan, which generates the following within the report:

Based on the Prowler report, which of the following is the BEST recommendation?

  • A. Delete CloudDev access key 1.
  • B. Delete BusinessUsr access key 1.
  • C. Delete access key 1.
  • D. Delete access key 2.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
skibby16
1 year, 7 months ago
Selected Answer: C
Prowler is a tool that can scan AWS environments for security issues and compliance violations. The Prowler report shows that there are two access keys for CloudDev user: access key 1 and access key 2. Access key 1 has not been used in more than 90 days, which violates the AWS CIS benchmark 1.4 (Ensure access keys are rotated every 90 days or less). Therefore, the best recommendation is to delete access key 1 and use access key 2 instead. Deleting CloudDev access key 1, deleting BusinessUsr access key 1, or deleting access key 2 are not appropriate recommendations based on the Prowler report. Reference: https://github.com/toniblyx/prowler
upvoted 2 times
...
[Removed]
1 year, 10 months ago
Selected Answer: D
This is a D account because no one is using it.
upvoted 1 times
...
kyky
2 years ago
Selected Answer: B
I agree on B
upvoted 1 times
...
Fibonacci_i
2 years, 1 month ago
Selected Answer: B
I choose B because BusinessUser "FAIL" based on Prowler report
upvoted 1 times
...
IAlonsoAck
2 years, 2 months ago
I would go with C. Why 2 different users would be using the same Key?
upvoted 2 times
...
khrid4
2 years, 3 months ago
Selected Answer: B
I initially thought that it is D but after seeing everyone's points, I'm changing it to B. Correct me if im wrong but the pass/fail criteria depends on the first line: "Ensure credentials unused for 30 days or great are disabled" Due to this, I understand that "no users found with access key 2 enabled" passed because the credentials/access key 2 is disabled. Hence, the only option that we need to take action is B.
upvoted 2 times
...
2Fish
2 years, 3 months ago
Selected Answer: B
B. This is a Fail and should be corrected as it presents the most significant security issues.
upvoted 2 times
...
AaronS1990
2 years, 4 months ago
absabs, you're misinterpreting what Pass and Fail mean (somehow) These are Pass or Fail checks that the system is passing or failing if you will on a security basis. The businessUsr key isn't being used or rotated. That is the security concern and that is what needs to be fixed. CloudDev hasn't been used since creation but there's no saying when the key was created but it could've been less than 30 days ago
upvoted 1 times
...
absabs
2 years, 4 months ago
Selected Answer: D
businessur has never used access key 1 (FAIL) -> he/she used it. Why you want delete the used key? No users found with access key 2 enabled? (PASS) -> so nobody using them. for reduce attack surface, i delete them. If i am wrong, discuss with me? i going with D
upvoted 2 times
db97
2 years, 4 months ago
Those seem to be pre-written rules to audit things they expect. If they set "businessuser" should not be accessing using key 1 it's because they probably expect to have a "pass" in this point, but surpriseee it failed. So they need to disable that one asap. Maybe I'm wrong but I'm using that logic.
upvoted 1 times
...
...
knister
2 years, 5 months ago
Selected Answer: D
I am going to go for D as first thing to disable.
upvoted 1 times
...
R00ted
2 years, 9 months ago
Selected Answer: B
B is the answer
upvoted 1 times
...
sh4dali
2 years, 9 months ago
Selected Answer: B
I would say B also.
upvoted 1 times
...
TheSkyMan
2 years, 9 months ago
Selected Answer: B
The only "FAIL!" in this report is BusinessUsr. I'll go with B.
upvoted 3 times
...
cyberseckid
2 years, 9 months ago
going with B , it say key 2 is not even enabled
upvoted 3 times
...
amateurguy
2 years, 9 months ago
Selected Answer: D
D seems correct.
upvoted 2 times
...
david124
2 years, 10 months ago
i think D, why ? cause you have remove unused keys first then go to used keys and investigate them. it's like closing the unused ports first then invisitage the used ports if they should be closed or still opened
upvoted 4 times
sh4dali
2 years, 9 months ago
No your reasoning does not make sense. It states Key 2 is not enabled/ not being used.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...