subject

A client is concerned that someone other than approved administrators is trying to gain access to the Linux web app instances in their VPC. She asks what sort of network access logging can be added. Which of the following might you recommend? (Choose 2)

A. Set up a traffic logging rule on the VPC firewall appliance and direct the log to CloudWatch or S3.
B. Set up a Flow Log for the group of instances and forward them to CloudWatch.
C. Set up a Flow Log for the group of instances and forward them to S3.
D. Use Event Log filters to trigger alerts that are forwarded to CloudWatch
E. Make use of an OS level logging tools such as iptables and log events to CloudWatch or S

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 15:20
An ou structure in your domain has one ou per department, and all the computer and user accounts are in their respective ous. you have configured several gpos defining computer and user policies and linked the gpos to the domain. a group of managers in the marketing department need different policies that differ from those of the rest of the marketing department users and computers, but you don't want to change the top-level ou structure. which of the following gpo processing features are you most likely to use? a, block inheritance b, gpo enforcement c, wmi filtering d, loopback processing
Answers: 3
question
Computers and Technology, 24.06.2019 03:00
Click the "draw structure" button to activate the drawing utility. draw two diastereomers of (1z,4r)−1,4−dimethylcyclodecene and name them, including (e)/(z) and (r)/(s) notation. part 1 out of 4 draw the diastereomer containing a chiral center with s configuration here. window open
Answers: 1
question
Computers and Technology, 24.06.2019 06:30
For which utilities, if any, does the landlord pay?
Answers: 2
question
Computers and Technology, 25.06.2019 08:30
Acollection of computers and other devices that are connected together to enable users to share hardware, software, and data, as well as to communicate electronically with each other is called
Answers: 1
You know the right answer?
A client is concerned that someone other than approved administrators is trying to gain access to th...
Questions
question
Mathematics, 11.08.2021 01:10
question
Mathematics, 11.08.2021 01:10
question
Social Studies, 11.08.2021 01:10
question
Mathematics, 11.08.2021 01:10
question
Engineering, 11.08.2021 01:10
Questions on the website: 13722363