In IAM, a policy has to include the information about who (user) is allowed to access the resource, known as the _____.
A root AWS account owner has created three IAM users: Bob, John and Michael. Michael is the IAM administrator. Bob and John are not the super users, but users with some pre-defined policies. John does not have access to modify his password. Thus, he asks Bob to change his password. How can Bob change John's password?
How many metrics are supported by CloudWatch for Auto Scaling?
What are the benefits of CloudTrail integration with CloudWatch Logs?
In a hardware security module (HSM), what is the function of a Transparent Data Encryption (TDE)?