题目
CSYE6225.17541.202610 Quiz 1- Requires Respondus LockDown Browser
多项选择题
Which IAM security practices are recommended? (Select ALL that apply)
选项
A.shared root user access keys
B.Use multi-factor authentication
C.store credentials in code repositories
D.Apply principle of least privilege
查看解析
标准答案
Please login to view
思路分析
When evaluating IAM security practices, I consider both recommended and discouraged approaches and how they impact access control and risk.
Option: shared root user access keys
Reasoning: Sharing root access keys is risky because the root account has unrestricted privileges. If keys are shared, there is no traceability or accountability for actions, and a single compromis......Login to view full explanation登录即可查看完整答案
我们收录了全球超50000道考试原题与详细解析,现在登录,立即获得答案。
类似问题
What components ensure secure access and management of user identities within the digital ecosystem?
Which of the following describes a security best practice that can be implemented by using AWS Identity and Access Management (IAM)?
Which of the following are best practices to secure your account using the identity and Access Management (IAM)? (Choose 2)
Which AWS service enables identity and access management?
更多留学生实用工具
希望你的学习变得更简单
加入我们,立即解锁 海量真题 与 独家解析,让复习快人一步!