Which of the following approaches achieve this requirement?

A company requires that IP packet data be inspected for invalid or malicious content.

Which of the following approaches achieve this requirement? (Choose two.)
A . Configure a proxy solution on Amazon EC2 and route all outbound VPC traffic through it. Perform inspection within proxy software on the EC2 instance.
B . Configure the host-based agent on each EC2 instance within the VP
C . Perform inspection within the host-based agent.
D . Enable VPC Flow Logs for all subnets in the VP
E . Perform inspection from the Flow Log data within Amazon CloudWatch Logs.
F . Configure Elastic Load Balancing (ELB) access logs. Perform inspection from the log data within the ELB access log files.
G . Configure the CloudWatch Logs agent on each EC2 instance within the VP
H . Perform inspection from the log data within CloudWatch Logs.

Answer: AB

Latest SCS-C01 Dumps Valid Version with 470 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments