Skip to main content

A company is setting up AWS accounts for the first time and wants to follow IAM best practices. The security team requires that no one should use the root account for day-to-day operations and that all privileged actions must require an additional layer of verification. Which combination of actions should a solutions architect recommend? (Choose the most complete answer.)

This is a free preview. Create an account to access all 340 questions.