New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Paloalto Networks Palo Alto Networks Cloud Security Professional CloudSec-Pro Question # 27 Topic 3 Discussion

Paloalto Networks Palo Alto Networks Cloud Security Professional CloudSec-Pro Question # 27 Topic 3 Discussion

CloudSec-Pro Exam Topic 3 Question 27 Discussion:
Question #: 27
Topic #: 3

Which ROL query is used to detect certain high-risk activities executed by a root user in AWS?


A.

event from cloud.audit_logs where operation IN ( 'ChangePassword', 'ConsoleLogin', 'DeactivateMFADevice', 'DeleteAccessKey' , 'DeleteAlarms' ) AND user = 'root'


B.

event from cloud.security_logs where operation IN ( 'ChangePassword', 'ConsoleLogin', 'DeactivateMFADevice', 'DeleteAccessKey' , 'DeleteAlarms' ) AND user = 'root'


C.

config from cloud.audit_logs where operation IN ( 'ChangePassword', 'ConsoleLogin', 'DeactivateMFADevice', 'DeleteAccessKey', 'DeleteAlarms' ) AND user = 'root'


D.

event from cloud.audit_logs where Risk.Level = 'high' AND user = 'root'


Get Premium CloudSec-Pro Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.