Explore these AWS CloudTrail MCQ questions and answers to master advanced CloudTrail features and integrations. Learn about CloudTrail Insights, integration with AWS Lambda and EventBridge, and how it works with security services like GuardDuty and AWS Config. These questions will help strengthen your knowledge of CloudTrail’s capabilities and its role in AWS security and monitoring.
AWS CloudTrail MCQs
CloudTrail Insights
What does CloudTrail Insights help detect? a) Data transfers between AWS services b) Unusual API activities in your AWS environment c) Network latency in VPCs d) Cost anomalies in billing
Which feature does CloudTrail Insights use to identify unusual activities? a) Machine learning models b) Predefined event patterns c) Manual rule configurations d) Resource tagging
How are CloudTrail Insights data delivered? a) Directly to CloudWatch Logs b) As part of the regular CloudTrail logs c) Through a Lambda function d) Via S3 Glacier
What is required to enable CloudTrail Insights? a) A separate IAM policy for Insights b) Enabling it on specific trails c) Configuration in AWS Config d) Using the AWS CLI exclusively
CloudTrail Insights is most useful for detecting: a) Large-scale data breaches b) Sudden changes in API call patterns c) Outdated IAM roles d) Network ACL misconfigurations
Integration with AWS Lambda and EventBridge
How can you use AWS Lambda with CloudTrail? a) To archive logs automatically b) To trigger functions on specific API events c) To generate IAM policies dynamically d) To monitor S3 bucket size
What is the role of EventBridge in CloudTrail integration? a) Storing CloudTrail logs b) Automating responses to specific API events c) Creating virtual private networks d) Managing CloudFormation templates
How does EventBridge route events from CloudTrail? a) Using predefined event buses b) Through manual log configurations c) By leveraging IAM trust relationships d) Using Elastic Load Balancing rules
What type of action can a Lambda function perform when triggered by a CloudTrail event? a) Generate a compliance report b) Automatically remediate a misconfiguration c) Update EC2 instance sizes d) Modify CloudTrail encryption settings
Which AWS service is used to automatically trigger Lambda functions based on CloudTrail logs? a) CloudWatch Logs b) EventBridge c) DynamoDB Streams d) S3 Lifecycle Policies
What is a common use case for integrating Lambda and CloudTrail? a) Real-time security monitoring b) Large-scale data migration c) S3 bucket versioning d) VPC traffic mirroring
How does EventBridge ensure seamless integration with CloudTrail? a) By directly consuming logs stored in S3 b) By using event rules to match specific API calls c) By acting as a centralized data repository d) Through manual event bus configuration
Using CloudTrail with Security Services
What does GuardDuty use CloudTrail logs for? a) Detecting potential security threats b) Managing IAM role permissions c) Monitoring EC2 CPU utilization d) Encrypting data in S3
Which AWS security service integrates with CloudTrail to provide compliance tracking? a) AWS Config b) Amazon Macie c) AWS KMS d) AWS Fargate
How does AWS Config leverage CloudTrail logs? a) To track configuration changes in resources b) To encrypt sensitive data c) To monitor billing anomalies d) To update EC2 AMI versions
What is a benefit of using CloudTrail with GuardDuty? a) Detecting unauthorized API calls b) Automatic cost optimization c) Managing security group rules d) Creating custom EC2 snapshots
How does CloudTrail enhance security auditing? a) By logging all API calls made in an AWS account b) By creating automatic IAM policies c) By enforcing compliance requirements d) By archiving unused data
What can AWS Security Hub do with CloudTrail data? a) Correlate findings across services b) Adjust EC2 instance types c) Enable multi-region VPC peering d) Optimize S3 bucket performance
Which service can alert you about unexpected CloudTrail events? a) Amazon GuardDuty b) AWS Glue c) AWS Auto Scaling d) Amazon Aurora
How can CloudTrail logs help with GDPR compliance? a) By providing detailed records of data access activities b) By encrypting data in transit c) By minimizing VPC costs d) By resizing EC2 instances
What does CloudTrail log by default? a) Management events b) Data transfer rates c) Reserved EC2 instances d) S3 lifecycle rules
How can AWS Config and CloudTrail work together for security? a) By tracking resource configuration changes with detailed event history b) By encrypting all resources automatically c) By increasing storage capacity d) By enabling faster data retrieval
What does CloudTrail log to help identify root causes of incidents? a) API call details b) EC2 instance types c) S3 bucket sizes d) AWS billing rates
How can CloudTrail logs support disaster recovery? a) By providing a detailed audit trail of AWS activities b) By resizing RDS databases automatically c) By managing multi-AZ failovers d) By archiving unused resources
Which encryption method does CloudTrail support for log data? a) AWS Key Management Service (KMS) encryption b) Default EC2 instance keys c) RDS database encryption d) Manual file-based encryption
Answers
QNo
Answer (Option with Text)
1
b) Unusual API activities in your AWS environment
2
b) Predefined event patterns
3
b) As part of the regular CloudTrail logs
4
b) Enabling it on specific trails
5
b) Sudden changes in API call patterns
6
b) To trigger functions on specific API events
7
b) Automating responses to specific API events
8
a) Using predefined event buses
9
b) Automatically remediate a misconfiguration
10
b) EventBridge
11
a) Real-time security monitoring
12
b) By using event rules to match specific API calls
13
a) Detecting potential security threats
14
a) AWS Config
15
a) To track configuration changes in resources
16
a) Detecting unauthorized API calls
17
a) By logging all API calls made in an AWS account
18
a) Correlate findings across services
19
a) Amazon GuardDuty
20
a) By providing detailed records of data access activities
21
a) Management events
22
a) By tracking resource configuration changes with detailed event history
23
a) API call details
24
a) By providing a detailed audit trail of AWS activities