Which of the following are tasks that only the root user can complete?
Modify your support plan & Change the account name and email address.
Which service allows you to create access keys for someone needing to access AWS via the command line interface (CLI)?
AWS Identity and Access Management (IAM)
Which service helps you control access to mobile and web applications?
Cognito
How do you manage permissions for multiple users at once using AWS Identity and Access Management (IAM)?
Groups
Which service can integrate with a Lambda function to automatically take remediation steps when it uncovers suspicious network activity when monitoring logs in your AWS account?
Amazon GuardDuty
Which service allows you to locate credit card numbers stored in Amazon S3?
Amazon Macie
Which service protects your web application from cross-site scripting attacks?
AWS Web Application Firewall (WAF)
Which service allows you to record software configuration changes within your Amazon EC2 instances over time?
AWS Config
What is the purpose of CloudHSM?
Its purpose is to enable you to easily create and use your own encryption keys
In the shared responsibility model, what is the customer responsible for?
Firewall configuration and application security & Patching the guest operating system (OS)
Select the FALSE statement regarding the pillars of the AWS Well-Architected Framework.
The Cost Optimization pillar enables the ability to run systems to deliver business value at the lowest price point by utilizing a capital expenditures (CAPEX) model.