You have been asked to design a layered security solution for protecting your organization's net-work infrastructure. You research several options and decide to deploy a network-level security con-trol appliance, inline, where traffic is intercepted and analyzed prior to being forwarded to its final destination, such as an application server. Which of the following is NOT considered an inline threat protection technology?
A) Intrusion prevention systems
B) Third-party firewall devices installed on Amazon EC2 instances
C) Data loss management gateways
D) Augmented security groups with Network ACLs
Correct Answer:
Verified
Q238: Which of the following statements describes launch
Q239: Can you use CloudWatch to monitor memory
Q240: In which screen does a user select
Q241: In AWS Identity and Access Management (IAM),
Q242: Amazon S3 provides a number of security
Q244: Which of the following statements is true
Q245: You need to set up security for
Q246: AWS Cloud Hardware Security Modules (HSMs) are
Q247: Can a user depict CloudWatch metrics such
Q248: A user has configured two security groups
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents