List of questions
Related questions
Question 387 - SCS-C01 discussion
Your company has the following setup in AWS a. A set of EC2 Instances hosting a web application b. An application load balancer placed in front of the EC2 Instances There seems to be a set of malicious requests coming from a set of IP addresses. Which of the following can be used to protect against these requests?
Please select:
A.
Use Security Groups to block the IP addresses
B.
Use VPC Flow Logs to block the IP addresses
C.
Use AWS inspector to block the IP addresses
D.
Use AWS WAF to block the IP addresses
Your answer:
0 comments
Sorted by
Leave a comment first