Which of the following are correct statements regarding the use of access keys? (Choose two.)
Given the following RQL:Which audit event snippet is identified by the RQL?
The development team is building pods to host a web front end, and they want to protect these pods with an application firewall.Which type of policy should be created to protect this pod from Layer7 attacks?
A manager informs the SOC that one or more RDS instances have been compromised and the SOC needs to make sure production RDS instances are NOT publicly accessible.Which action should the SOC take to follow security best practices?
An administrator wants to enforce a rate limit for users not being able to post five (5) .tar.gz files within five (5) seconds.What does the administrator need to configure?
Given a default deployment of Console, a customer needs to identify the alerted compliance checks that are set by default.Where should the customer navigate in Console?