ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 300 - SCS-C02 discussion

Report
Export

A company deployed an Amazon EC2 instance to a VPC on AWS. A recent alert indicates that the EC2 instance is receiving a suspicious number of requests over an open TCP port from an external source. The TCP port remains open for long periods of time.

The company's security team needs to stop all activity to this port from the external source to ensure that the EC2 instance is not being compromised. The application must remain available to other users.

Which solution will mefet these requirements?

A.
Update the network ACL that is attached to the subnet that is associated with the EC2 instance. Add a Deny statement for the port and the source IP addresses.
Answers
A.
Update the network ACL that is attached to the subnet that is associated with the EC2 instance. Add a Deny statement for the port and the source IP addresses.
B.
Update the elastic network interface security group that is attached to the EC2 instance to remove the port from theinbound rule list.
Answers
B.
Update the elastic network interface security group that is attached to the EC2 instance to remove the port from theinbound rule list.
C.
Update the elastic network interface security group that is attached to the EC2 instance by adding a Deny entry in the inbound list for the port and the source IP addresses.
Answers
C.
Update the elastic network interface security group that is attached to the EC2 instance by adding a Deny entry in the inbound list for the port and the source IP addresses.
D.
Create a new network ACL for the subnet. Deny all traffic from the EC2 instance to prevent data from being removed.
Answers
D.
Create a new network ACL for the subnet. Deny all traffic from the EC2 instance to prevent data from being removed.
Suggested answer: A

Explanation:

To address the issue of an Amazon EC2 instance receiving suspicious requests over an open TCP port, the most effective solution is to update the Network Access Control List (NACL) associated with the subnet where the EC2 instance resides. By adding a deny rule for the specific TCP port and source IP addresses involved in the suspicious activity, the security team can effectively block unwanted traffic at the subnet level. NACLs act as a stateless firewall for controlling traffic in and out of subnets, allowing for broad-based traffic filtering. This measure ensures that only legitimate traffic can reach the EC2 instance, thereby enhancing security without affecting the application's availability to other users. It's a more granular and immediate way to block specific traffic compared to modifying security group rules, which are stateful and apply at the instance level.

asked 16/09/2024
GISELE AGNARAMON
45 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first