An AWS Lambda function was misused to alter data, and a security engineer must identify who invoked the
function and what output was produced. The engineer cannot find any logs created by the Lambda function in
Amazon CloudWatch Logs.
Which of the following explains why the logs are not available?
A company has several Amazon S3 buckets that do not enforce encryption in transit. A security engineer must
implement a solution that enforces encryption in transit for all the company's existing and future S3 buckets.
Which solution will meet these requirements?
An AWS Lambda function was misused to alter data, and a security engineer must identify who invoked the
function and what output was produced. The engineer cannot find any logs created by the Lambda function in
Amazon CloudWatch Logs.
Which of the following explains why the logs are not available?
A company needs a cloud-based, managed desktop solution for its workforce of remote employees. The
company wants to ensure that the employees can access the desktops only by using company-provided
devices. A security engineer must design a solution that will minimize cost and management overhead.
Which solution will meet these requirements?
A company is running a new workload across accounts in an organization in AWS Organizations. All running
resources must have a tag of CostCenter, and the tag must have one of three approved values. The company
must enforce this policy and must prevent any changes of the CostCenter tag to a non-approved value.
Which solution will meet these requirements?