Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Fred is a security Engineer,Who is managing a banking application that is hosted on AWS.he had stored the highly sensitive personal informations in a web

Fred is a security Engineer,Who is managing a banking application that is hosted on AWS.he had stored the highly sensitive personal informations in a web application running on EC2.The application has to meet compliance requirements, where all the incoming traffic to the application is protected from common web exploits and all the outgoing traffic from the EC2 instances to specific whitelisted URLS. Which serices from AWS should the Security Engineer leverage to meet these requirements? choose anser bellow oprtion 1.Use AWS Shield to Scan inbound traffic for web exploits.Use VPC Flow Logs and AWS Lambda to restrict egress traffic to specific whitelisted URLs. 2.Use AWS Shield to scan inbound traffic for wb exploits.Use a third -party AWS Marketplace solution to restart egress traffic to specific whitelisted Urls. 3.Use AWS WAF to scan inbound traffic for web exploits. Use VPC Flow Logs and AWS Lambda to restrict egress traffic to specific whitelisted URLs. 4.Use AWS WAF to Scan inbound traffic for web exploits.Use a third-Party AWS MarketPlace solution to restrict egress traffic to speciffic whitelisted URLs.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Joe Celkos Data And Databases Concepts In Practice

Authors: Joe Celko

1st Edition

1558604324, 978-1558604322

More Books

Students also viewed these Databases questions