What information is found on an AWS Identity and Access Management (IAM) credential report?
(Choose two.)
The date and time when an IAM user’s password was last used to sign in to the AWS Management Console.
The type of multi-factor authentication (MFA) device assigned to an IAM user.
The User-Agent browser identifier for each IAM user currently logged in.
Whether multi-factor authentication (MFA) has been enabled for an IAM user.
The number of incorrect login attempts by each IAM user in the previous 30 days.
Explanations:
The IAM credential report includes the date and time when each user’s password was last used to sign in to the AWS Management Console. This helps administrators monitor user activity and password usage.
The credential report does not include the type of multi-factor authentication (MFA) device assigned to an IAM user. It only indicates whether MFA is enabled.
The IAM credential report does not capture User-Agent browser identifiers for logged-in users. It focuses on credentials and their status rather than active session details.
The report provides information on whether multi-factor authentication (MFA) has been enabled for each IAM user. This is critical for security and compliance assessments.
The IAM credential report does not track the number of incorrect login attempts by users. This information is not included in the credential report.