Computers and Technology
Computers and Technology, 14.02.2020 06:13, alexa3941

A client is concerned that someone other than approved administrators is trying to gain access to the Linux web app instances in their VPC. She asks what sort of network access logging can be added. Which of the following might you recommend? (Choose 2)

A. Set up a traffic logging rule on the VPC firewall appliance and direct the log to CloudWatch or S3.
B. Set up a Flow Log for the group of instances and forward them to CloudWatch.
C. Set up a Flow Log for the group of instances and forward them to S3.
D. Use Event Log filters to trigger alerts that are forwarded to CloudWatch
E. Make use of an OS level logging tools such as iptables and log events to CloudWatch or S

answer
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 10:00, ozzy55
Create a word problem that involves calculating the volume and surface area of a three-dimensional object. cube: surface area 6 s2 , volume s3
Answers: 3
image
Computers and Technology, 23.06.2019 04:31, hargunk329
Q13 what function does a security certificate perform? a. creates user accounts b. scrambles data c. identifies users d. creates password policies e. provides file access
Answers: 1
image
Computers and Technology, 23.06.2019 06:00, jack487
How can a user delete a drawing object
Answers: 1
image
Computers and Technology, 23.06.2019 14:30, ladawnrowles005
The option enables you to modify a slide element in most presentation applications.
Answers: 2
Do you know the correct answer?
A client is concerned that someone other than approved administrators is trying to gain access to th...

Questions in other subjects:

Konu
Mathematics, 23.02.2021 22:40
Konu
Chemistry, 23.02.2021 22:40