A company requires that IP packet data be inspected for invalid or malicious content. Which of the following approaches achieve this requirement? (Choose two.)
A) Configure a proxy solution on Amazon EC2 and route all outbound VPC traffic through it. Perform inspection within proxy software on the EC2 instance.
B) Configure the host-based agent on each EC2 instance within the VPC. Perform inspection within the host-based agent.
C) Enable VPC Flow Logs for all subnets in the VPC. Perform inspection from the Flow Log data within Amazon CloudWatch Logs.
D) Configure Elastic Load Balancing (ELB) access logs. Perform inspection from the log data within the ELB access log files.
E) Configure the CloudWatch Logs agent on each EC2 instance within the VPC. Perform inspection from the log data within CloudWatch Logs.
Correct Answer:
Verified
Q14: A Systems Engineer has been tasked with
Q15: A company wants to control access to
Q16: A security team is responsible for reviewing
Q17: An application is currently secured using network
Q18: A Security Engineer must enforce the use
Q20: A company has complex connectivity rules governing
Q21: An application outputs logs to a text
Q22: A company has deployed a custom DNS
Q23: An organization has tens of applications deployed
Q24: A Security Administrator is configuring an Amazon
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents