LeetQuiz Logo
Privacy Policy•contact@leetquiz.com
© 2025 LeetQuiz All rights reserved.
AWS Certified Security - Specialty

AWS Certified Security - Specialty

Get started today

Ultimate access to all questions.


Consider a scenario where a company experiences a security incident involving unauthorized access to their AWS RDS database. How would you use AWS CloudTrail and AWS Config to trace the incident and what steps would you take to secure the database post-incident? Describe the process from detection to recovery.

Simulated



Explanation:

Option B is correct because it uses both AWS CloudTrail and AWS Config for a comprehensive tracing and recovery process, which is essential for securing the database post-incident.

Powered ByGPT-5