A company has an Amazon Redshift cluster with database audit logging enabled. A security audit shows that raw SQL statements that run against the Redshift cluster are being logged to an Amazon S3 bucket. The security team requires that authentication logs are generated for use in an intrusion detection system (IDS), but the security team does not require SQL queries. What should a database specialist do to remediate this issue? A. Set the use_fips_ssl parameter to true in the database parameter group. B. Turn off the query monitoring rule in the Redshift cluster's workload management (WLM). C. Set the enable_user_activity_logging parameter to false in the database parameter group. D. Disable audit logging on the Redshift cluster.  Suggested Answer: B Community Answer: C This question is in DBS-C01 AWS Certified Database – Specialty Exam For getting AWS Certified Database – Specialty Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by Amazon. Trademarks, certification & product names are used for reference only and belong to Amazon. The website does not contain actual questions and answers from Amazon's Certification Exam.
Please login or Register to submit your answer