Final answer:
Encryption details for DynamoDB using AWS owned CMKs are not present in CloudTrail logs because AWS automatically encrypts tables with its own managed keys without user intervention.
Step-by-step explanation:
The student is concerned about not being able to find the encryption details for a DynamoDB instance in the AWS CloudTrail service logs. The correct option that explains this situation is: d. By default, all DynamoDB tables are encrypted under an AWS owned customer master key (CMK), which do not write to CloudTrail logs. When AWS manages the encryption keys, the details of the key usage for the encryption and decryption of DynamoDB tables are not logged by CloudTrail because this is part of the underlying service operation managed by AWS. Encryption with AWS managed CMKs is done automatically, and thus, users do not need to take any action or monitor this component specifically through CloudTrail.