A. Control access to AWS service APIs and to other specific resources. Most Voted
B. Provide intelligent threat detection and continuous monitoring.
C. Protect the AWS environment using multi-factor authentication (MFA). Most Voted
D. Grant users access to AWS data centers.
E. Provide firewall protection for applications from common web attacks.

- Awsexamhub website is not related to, affiliated with, endorsed or authorized by Amazon.
- Trademarks, certification & product names are used for reference only and belong to Amazon.