Examlex
A company's web application is hosted on Amazon EC2 instances running behind an Application Load Balancer (ALB) in an Auto Scaling group. An AWS WAF web ACL is associated with the ALB. AWS CloudTrail is enabled, and stores logs in Amazon S3 and Amazon CloudWatch Logs. The Operations team has observed some EC2 instances reboot at random. After rebooting, all access logs on the instances have been deleted. During an investigation, the Operations team found that each reboot happened just after a PHP error occurred on the new-user-creation.php file. The Operations team needs to view log information to determine if the company is being attacked. Which set of actions will identify the suspect attacker's IP address for future occurrences?
Open Source Software
Software with its source code freely available for modification and distribution, encouraging collaboration and transparency in development.
Computing Products
Refers to tangible and intangible items generated by the computing industry, including hardware, software, and services designed to fulfill specific technological needs.
Personal Information Management
The practice of managing and organizing electronic data related to an individual's personal details, schedules, communications, and resources.
Business Contacts
Individuals or entities involved in commercial interactions, providing opportunities for networking, partnerships, and sales.
Q76: A company's Developers plan to migrate their
Q90: A company's Information Security team wants to
Q107: A company wants to classify user behavior
Q108: A Machine Learning Specialist built an image
Q119: A gaming company is developing a mobile
Q194: A company has copied 1 PB of data
Q232: A developer has written a multi-threaded application
Q236: A company has decided to migrate sensitive
Q251: A company has multiple VPCs in their
Q278: An AWS Lambda function requires read access