cloud-practitioner video for which of the following AWS services can be used to continuously monitor both malicious activities as well as unauthorized behavior
Which of the following AWS services can be used to continuously monitor both malicious activities as well as unauthorized behavior to protect your AWS accounts and workloads?