List of questions
Related questions
Question 457 - SCS-C01 discussion
Example.com is hosted on Amazon EC2 instances behind an Application Load Balancer (ALB). Thirdparty host intrusion detection system (HIDS) agents that capture the traffic of the EC2 instance are running on each host. The company must ensure they are using privacy enhancing technologies for users, without losing the assurance the third-party solution offers. What is the MOST secure way to meet these requirements?
A.
Enable TLS pass through on the ALB, and handle decryption at the server using Elliptic Curve Diffie-Hellman (ECDHE) cipher suites.
B.
Create a listener on the ALB that uses encrypted connections with Elliptic Curve Diffie-Hellman(ECDHE) cipher suites, and pass the traffic in the clear to the server.
C.
Create a listener on the ALB that uses encrypted connections with Elliptic Curve Diffie-Hellman(ECDHE) cipher suites, and use encrypted connections to the servers that do not enable Perfect Forward Secrecy (PFS).
D.
Create a listener on the ALB that does not enable Perfect Forward Secrecy (PFS) cipher suites, and use encrypted connections to the servers using Elliptic Curve Diffie-Hellman (ECDHE) cipher suites.
Your answer:
0 comments
Sorted by
Leave a comment first