Which of the following information does an attacker enumerate by analyzing the AWS error messages that reveal information regarding the existence of a user?
A. Enumerating AWS account IDs
B. Enumerating S3 buckets
C. Enumerating IAM roles
D. Enumerating bucket permissions
Answer: C. Enumerating IAM roles
Computer Science & Information Technology
You might also like to view...
In Word, ________ help direct the reader's eye to the information that you consider important
A) symbols B) columns C) borders and shading D) tabs and leaders
Computer Science & Information Technology
You are NOT able to add new words to the Office dictionary
Indicate whether the statement is true or false.
Computer Science & Information Technology