Question 41:
As an AWS System Administrator, you have enabled Amazon GuardDuty to identify and detect security issues in your AWS account continuously. You also need to set up relevant preventive actions based on different types of security findings. One preventive action is that when an EC2 instance is under brute force attacks, the SSH port would be closed in the security group automatically. How would you configure various preventative actions in the most appropriate way?
Answer options:
A.In the Amazon GuardDuty console, configure a Lambda function to take preventative actions for each type of findings. B.Create a CloudWatch Event rule for the "source" of "aws.guardduty" and "detail-type" of "GuardDuty Finding" with a Lambda function target to take preventative actions. C.Create a CloudWatch Event rule for the "source" of "AWS API Call via CloudTrail" and "detail-type" of "guardduty.amazonaws.com" with a Lambda function target to act upon the GuardDuty findings. D.In AWS Config, configure the GuardDuty rule managed by AWS. Add a remediation Lambda function to customize the preventative actions.