Question: 1
You are designing a custom IAM policy that would allow uses to list buckets in S3 only if they are MFA authenticated. Which of the following would best match this requirement?
Answer : A
Show Answer
Hide Answer
Question: 2
Which of the following bucket policies will ensure that objects being uploaded to a bucket called 'demo' are encrypted.
Please select:
Answer : A
Show Answer
Hide Answer
Question: 3
A company's Director of information Security wants a daily email report from AWS that contains recommendations for each company account to meet AWS Security best practices
Which solution would meet these requirements?
Question: 4
A company's Security Engineer has been asked to monitor and report all AWS account root user activities
Which of the following would enable the Security Engineer to monitor and report all root user activities? (Select TWO)
Question: 5
A security engineer to ensure their company's uses of AWS meets AWS security best practices. As part of this, the AWS account root user must not be used for daily work. The root user must be monitored for use, and the Security team must be alerted as quickly as possible if the root user is used.
Which solution meets these requirements?