
Ultimate access to all questions.
Your company has experienced a security breach involving multiple compromised resources. How would you use Amazon Detective to conduct a root cause analysis? Describe the steps and the benefits of using Detective over traditional log analysis methods.
A
Import logs into Detective and manually analyze the data for anomalies.
B
Configure Detective to automatically analyze AWS resources and identify the root cause.
C
Use Detective to correlate logs and visualize the attack path, then manually identify the root cause.
D
Manually review CloudTrail logs and correlate them with VPC Flow Logs to identify the root cause.