AWS Certified Security - Specialty

AWS Certified Security - Specialty

Get started today

Ultimate access to all questions.


A company operates a web application on an Apache web server hosted on Amazon EC2 instances within an Auto Scaling group. These EC2 instances are configured to forward Apache web server logs to an Amazon CloudWatch Logs group, which is set to automatically expire after one year. Recently, the company identified suspicious activities in the logs, specifically a series of requests from a particular IP address. A security engineer has been tasked with analyzing the logs from the past week to ascertain the volume of requests from this IP address and to identify the URLs that were accessed. What is the most efficient method for the security engineer to conduct this analysis?