Which of the following information does an attacker enumerate by analyzing the AWS error messages that reveal information regarding the existence of a user?

A. Enumerating AWS account IDs
B. Enumerating S3 buckets
C. Enumerating IAM roles
D. Enumerating bucket permissions

Answer: C. Enumerating IAM roles

Computer Science & Information Technology

You might also like to view...

In Word, ________ help direct the reader's eye to the information that you consider important

A) symbols B) columns C) borders and shading D) tabs and leaders

Computer Science & Information Technology

You are NOT able to add new words to the Office dictionary

Indicate whether the statement is true or false.

Computer Science & Information Technology