A CHFI is analyzing suspicious activity on a company's AWS account. She suspects an unauthorized user accessed and deleted a crucial bucket object. To trace the potential perpetrator, she should primarily rely on the following:
A.
S3 Server Access logs to understand actions performed on a bucket object
B.
AWS CloudTrail logs to determine when and where the specific API calls were made
C.
Amazon CloudWatch logs to monitor system and application log data in real time
D.
Amazon VPC Flow Logs to scrutinize the IP traffic entering and leaving the specific VPC
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Elb
6 months, 1 week ago