Which of the following approaches achieve this requirement?

Posted by: Pdfprep Category: SCS-C01 Tags: , ,

A company requires that IP packet data be inspected for invalid or malicious content.

Which of the following approaches achieve this requirement? (Choose two.)
A . Configure a proxy solution on Amazon EC2 and route all outbound VPC traffic through it. Perform inspection within proxy software on the EC2 instance.
B . Configure the host-based agent on each EC2 instance within the VP
C . Perform inspection within the host-based agent.
D . Enable VPC Flow Logs for all subnets in the VP
E . Perform inspection from the Flow Log data within Amazon CloudWatch Logs.
F . Configure Elastic Load Balancing (ELB) access logs. Perform inspection from the log data within the ELB access log files.
G . Configure the CloudWatch Logs agent on each EC2 instance within the VP
H . Perform inspection from the log data within CloudWatch Logs.

Answer: AB

Leave a Reply

Your email address will not be published.