ExamQuestions.com

Register
Login
AWS Certified Security Specialty Exam Questions

Amazon

AWS Certified Security Specialty

289 / 310

Question 289:

You have been experimenting with the usage of KMS keys. Along the way, you have created several CMK keys and used them in applications in different areas. You now want to delete the keys which are no longer being used. Which of the following options would you use to achieve this? (Select TWO.)

Answer options:

A.Use AWS Config to see where all the keys have been used.
B.Use CloudTrail logs to see where all the keys have been used.
C.Consider disabling the keys that are not being used.
D.Consider rotating the keys being used.