Multiple Choice
A company requires that IP packet data be inspected for invalid or malicious content. Which of the following approaches achieve this requirement? (Choose two.)
A) Configure a proxy solution on Amazon EC2 and route all outbound VPC traffic through it. Perform inspection within proxy software on the EC2 instance.
B) Configure the host-based agent on each EC2 instance within the VPC. Perform inspection within the host-based agent.
C) Enable VPC Flow Logs for all subnets in the VPC. Perform inspection from the Flow Log data within Amazon CloudWatch Logs.
D) Configure Elastic Load Balancing (ELB) access logs. Perform inspection from the log data within the ELB access log files.
E) Configure the CloudWatch Logs agent on each EC2 instance within the VPC. Perform inspection from the log data within CloudWatch Logs.
Correct Answer:

Verified
Correct Answer:
Verified
Q12: A company has an application hosted in
Q13: A Software Engineer wrote a customized reporting
Q14: A company will store sensitive documents in
Q15: A company has a serverless application for
Q16: A company plans to migrate a sensitive
Q18: A company wants to encrypt the private
Q19: An organization policy states that all encryption
Q20: An organization receives an alert that indicates
Q21: A company uses AWS Organization to manage
Q22: A company hosts an application on Amazon