Explore these AWS CloudTrail MCQ questions and answers to enhance your understanding of topics such as anatomy of CloudTrail logs, event categories and sources, and filtering and querying logs. These questions are designed to help you grasp key concepts and improve your AWS CloudTrail expertise effectively.
Chapter 3: Understanding Event Data
1–10: Anatomy of CloudTrail Logs
What information is included in the eventName field of a CloudTrail log? a) Name of the AWS service b) Specific action performed c) Region of the event d) The IP address of the user
Which field in a CloudTrail log specifies the identity performing the action? a) eventSource b) userIdentity c) requestParameters d) awsRegion
What type of information is contained in the requestParameters section of a CloudTrail event? a) Identity of the user b) Parameters passed to the API request c) List of AWS services accessed d) The timestamp of the event
Which field indicates the AWS service generating the event in a CloudTrail log? a) eventSource b) eventName c) recipientAccountId d) eventTime
How is the time of an event recorded in a CloudTrail log? a) In local timezone format b) As a Unix timestamp c) In Coordinated Universal Time (UTC) d) Using the AWS regional timestamp
What is the purpose of the responseElements field in a CloudTrail event log? a) To capture the response details of the API call b) To log the IAM role used in the request c) To store information about errors d) To track user actions
What does the sourceIPAddress field represent in CloudTrail logs? a) IP address of the AWS resource b) IP address of the entity that made the request c) IP address of the AWS region d) IP address of the S3 bucket
What type of information is stored in the errorCode field? a) IAM role information b) API request parameters c) The region where the event occurred d) Error encountered during the API call
Which field records the AWS account ID that owns the resource? a) awsRegion b) eventName c) recipientAccountId d) eventSource
What is the significance of the eventVersion field in CloudTrail logs? a) It shows the version of the CloudTrail service used b) It specifies the version of the event log schema c) It tracks the version of the AWS CLI d) It indicates the event replication status
11–18: Event Categories and Sources
Which event category in CloudTrail includes AWS Management Console logins? a) Data events b) Insight events c) Management events d) Audit events
What is a data event in CloudTrail? a) An event related to changes in account configuration b) An event capturing activity on AWS resources like S3 objects c) An event for API calls through the AWS Management Console d) An event recording login attempts
What type of actions are included in management events? a) Actions on S3 objects b) EC2 instance data transfers c) Configuration and control plane actions d) Application-level events
What event source is associated with AWS Identity and Access Management (IAM)? a) s3.amazonaws.com b) iam.amazonaws.com c) ec2.amazonaws.com d) dynamodb.amazonaws.com
Which category of events provides insights into unusual activity detected in your account? a) Management events b) Data events c) Insight events d) Operational events
How can you distinguish between read-only and write-only events in CloudTrail logs? a) Using the eventSource field b) Checking the eventName field c) Inspecting the readOnly attribute d) Reviewing the eventTime field
Which service generates events when users upload files to an S3 bucket? a) AWS Lambda b) Amazon S3 c) AWS Config d) Amazon EC2
How can you track AWS Lambda function executions in CloudTrail? a) Enable Lambda execution logging b) Track management events from lambda.amazonaws.com c) Enable resource-based policies d) Use AWS Trusted Advisor
19–25: Filtering and Querying Logs
What tool can be used to query CloudTrail logs using SQL-like queries? a) AWS Glue b) Amazon Athena c) Amazon QuickSight d) AWS Config
How can you filter events by a specific resource in CloudTrail? a) Using event names b) Using the resource ID or name in the resources field c) Filtering the eventSource field d) Using tags assigned to the resource
Which AWS service enables real-time monitoring and filtering of CloudTrail logs? a) Amazon GuardDuty b) Amazon CloudWatch Logs Insights c) AWS Trusted Advisor d) AWS Secrets Manager
What is the purpose of an event selector in CloudTrail? a) To track errors in AWS accounts b) To customize which events are logged c) To enable log replication across regions d) To filter logs stored in S3 buckets
How can CloudTrail logs be filtered for a specific user action? a) By checking the eventName field b) Using the eventVersion field c) Filtering the awsRegion field d) Checking the eventSource field
Which service can automatically analyze and flag suspicious activity in CloudTrail logs? a) Amazon Macie b) Amazon Inspector c) AWS Config d) Amazon GuardDuty
What is the recommended way to store and query large amounts of CloudTrail logs? a) Use Amazon S3 with lifecycle policies b) Store logs in DynamoDB tables c) Use Amazon CloudFront for caching d) Transfer logs to RDS for querying
Answer Key
Qno
Answer (Option with Text)
1
b) Specific action performed
2
b) userIdentity
3
b) Parameters passed to the API request
4
a) eventSource
5
c) In Coordinated Universal Time (UTC)
6
a) To capture the response details of the API call
7
b) IP address of the entity that made the request
8
d) Error encountered during the API call
9
c) recipientAccountId
10
b) It specifies the version of the event log schema
11
c) Management events
12
b) An event capturing activity on AWS resources like S3 objects
13
c) Configuration and control plane actions
14
b) iam.amazonaws.com
15
c) Insight events
16
c) Inspecting the readOnly attribute
17
b) Amazon S3
18
b) Track management events from lambda.amazonaws.com
19
b) Amazon Athena
20
b) Using the resource ID or name in the resources field