Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 98 Topic 10 Discussion

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 98 Topic 10 Discussion

312-49v11 Exam Topic 10 Question 98 Discussion:
Question #: 98
Topic #: 10

During an internal audit following suspected misuse of privileged credentials at a technology services firm, investigators must review detailed activity records related to configuration changes, API calls, and access attempts made against cloud-hosted resources. The organization operates entirely within a single cloud provider ' s infrastructure, and the investigation requires a native service that records management-plane actions with precise timestamps, source addresses, and request parameters for later reconstruction of user activity. Which platform would investigators rely on to reconstruct this activity timeline?


A.

Azure Monitor Logs


B.

AWS CloudTrail


C.

Microsoft Sentinel


D.

Google Logs Explorer


Get Premium 312-49v11 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.