Topic 1 Question 77
A company maintains an open-source application that is hosted on a public GitHub repository. While creating a new commit to the repository, an engineer uploaded their AWS access key and secret access key. The engineer reported the mistake to a manager, and the manager immediately disabled the access key.
The company needs to assess the impact of the exposed access key. A security engineer must recommend a solution that requires the least possible managerial overhead.
Which solution meets these requirements?
Analyze an AWS Identity and Access Management (IAM) use report from AWS Trusted Advisor to see when the access key was last used.
Analyze Amazon CloudWatch Logs for activity by searching for the access key.
Analyze VPC flow logs for activity by searching for the access key.
Analyze a credential report in AWS Identity and Access Management (IAM) to see when the access key was last used.
ユーザの投票
コメント(11)
- 正解だと思う選択肢: D
D 99.999999% sure
👍 3[Removed]2023/11/24 - 正解だと思う選択肢: B
Best answer is B.
The ask is to " assess the impact of the exposed access key", which mean how the exposed access key has been used. Credential report does not include such information, it includes information about the credential itself..when it was created, last used, last changed. Not useful to assess the impact.
👍 3Raphaello2024/02/28 - 正解だと思う選択肢: D👍 2kejam2023/11/28
シャッフルモード