ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 138 - SCS-C01 discussion

Report
Export

A company requires that IP packet data be inspected for invalid or malicious content.

Which of the following approaches achieve this requirement? (Choose two.)

A.
Configure a proxy solution on Amazon EC2 and route all outbound VPC traffic through it. Perform inspection within proxy software on the EC2 instance.
Answers
A.
Configure a proxy solution on Amazon EC2 and route all outbound VPC traffic through it. Perform inspection within proxy software on the EC2 instance.
B.
Configure the host-based agent on each EC2 instance within the VPC. Perform inspection within the host-based agent.
Answers
B.
Configure the host-based agent on each EC2 instance within the VPC. Perform inspection within the host-based agent.
C.
Enable VPC Flow Logs for all subnets in the VPC. Perform inspection from the Flow Log data within Amazon CloudWatch Logs.
Answers
C.
Enable VPC Flow Logs for all subnets in the VPC. Perform inspection from the Flow Log data within Amazon CloudWatch Logs.
D.
Configure Elastic Load Balancing (ELB) access logs. Perform inspection from the log data within the ELB access log files.
Answers
D.
Configure Elastic Load Balancing (ELB) access logs. Perform inspection from the log data within the ELB access log files.
E.
Configure the CloudWatch Logs agent on each EC2 instance within the VPC. Perform inspection from the log data within CloudWatch Logs.
Answers
E.
Configure the CloudWatch Logs agent on each EC2 instance within the VPC. Perform inspection from the log data within CloudWatch Logs.
Suggested answer: A, B

Explanation:

“EC2 Instance IDS/IPS solutions offer key features to help protect your EC2 instances. This includes alerting administrators of malicious activity and policy violations, as well as identifying and taking action against attacks. You can use AWS services and third party IDS/IPS solutions offered in AWS Marketplace to stay one step ahead of potential attackers.”

asked 16/09/2024
Cesar Castillo
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first