Ask Question

A client is concerned that someone other than approved administrators is trying to gain access to the Linux web app instances in their VPC. She asks what sort of network access logging can be added. Which of the following might you recommend? (Choose 2)

A. Set up a traffic logging rule on the VPC firewall appliance and direct the log to CloudWatch or S3.

B. Set up a Flow Log for the group of instances and forward them to CloudWatch.

C. Set up a Flow Log for the group of instances and forward them to S3.

D. Use Event Log filters to trigger alerts that are forwarded to CloudWatch

E. Make use of an OS level logging tools such as iptables and log events to CloudWatch or S

+2
Answers (1)
  1. 27 March, 04:14
    0
    Option B and Option E is correct.

    Explanation:

    A client is worried that anyone other than authorised admins efforts to control the instances of the Linux browser in its VPC. So, they query what kind of network control monitoring can be applied. The user then suggested that the community of instances set up a Flow Log which is sent to CloudWatch and allow use through OS-level monitoring resources like iptables to log events to CloudWatch or S3.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “A client is concerned that someone other than approved administrators is trying to gain access to the Linux web app instances in their VPC. ...” in 📗 Computers & Technology if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers