A web company is looking to implement an intrusion detection and prevention system into their deployed VPC. This platform should have the ability to scale to thousands of instances running inside of the VPC, How should they architect their solution to achieve these goals?

A. Configure an instance with monitoring software and the elastic network interface (ENI) set to promiscuous mode packet sniffing to see an traffic across the VPC,
B. Create a second VPC and route all traffic from the primary application VPC through the second VPC where the scalable virtualized IDS/IPS platform resides.
C. Configure servers running in the VPC using the host-based 'route' commands to send all traffic through the platform to a scalable virtualized IDS/IPS.
D. Configure each host with an agent that collects all network traffic and sends that traffic to the IDS/IPS platform for inspection.

Answer: D. Configure each host with an agent that collects all network traffic and sends that traffic to the IDS/IPS platform for inspection.

Computer Science & Information Technology

You might also like to view...

True or False. You can edit the CSS file generated by the preprocessor directly in the CSS Designer.

What will be an ideal response?

Computer Science & Information Technology

Visio is a flowcharting program.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology