Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.
A
Best answer
Enable cloud control-plane audit logging such as CloudTrail or the provider equivalent.
This is the best choice because the exhibit shows API-level changes to identity, networking, and storage policies. Control-plane audit logging records who made those changes, what action was taken, and when it occurred. That creates the most useful evidence for investigations, change tracking, and compliance in a cloud environment.
B
Distractor review
Install a rootkit detector on each workload and ignore management-plane activity.
Host-based rootkit detection can help on individual instances, but it does not provide a complete record of cloud configuration changes. The exhibit is specifically about administrative API actions, not malware on a single server.
C
Distractor review
Capture only DNS traffic, because it reveals all admin changes indirectly.
DNS logs may provide context, but they do not record policy edits, role changes, or security group modifications. They are far too indirect for the stated requirement.
D
Distractor review
Rely on manual change tickets in a spreadsheet because cloud platforms do not record useful logs.
Manual tickets are useful for process control, but they are not a reliable security log. Cloud platforms do record detailed administrative activity, and that data should be enabled and retained.