AWS Certified SysOps Administrator Practice Exam

Disable ads (and more) with a membership for a one time $4.99 payment

Prepare for the AWS Certified SysOps Administrator Exam. Utilize flashcards, multiple-choice questions, tips, and in-depth explanations. Get exam-ready!

Practice this question and more.


Which AWS feature allows tracking actions taken on AWS resources?

  1. AWS Config

  2. AWS CloudTrail

  3. AWS CloudWatch

  4. AWS GuardDuty

The correct answer is: AWS CloudTrail

The feature that allows tracking actions taken on AWS resources is AWS CloudTrail. This service records AWS API calls and related events made by or on behalf of your AWS account. By logging these interactions, CloudTrail provides you with a comprehensive audit trail that can be used for security analysis, compliance auditing, and resource change tracking. Using CloudTrail, you can monitor actions such as who accessed specific resources and what operations were performed. Logs generated by CloudTrail can be stored in an S3 bucket, allowing for extensive long-term data analysis and reporting. This visibility into AWS account activity is essential for maintaining security and operational integrity. The other options serve different purposes: AWS Config focuses on resource configuration history and compliance, AWS CloudWatch is primarily used for monitoring application performance and health, while AWS GuardDuty is a threat detection service that identifies malicious activity. Each of these services plays its own role within AWS but does not specifically track actions on resources in the same way CloudTrail does.