Ultimate access to all questions.
Your company has engaged external auditors to evaluate the security setup, specifically focusing on the users and roles configured. What is the most effective method for auditors to review these configurations?
Explanation:
The correct answer is C because the IAM page provides a complete listing of all members and roles within the project, offering auditors a full view of the configurations.