Which of the following cannot be used in Amazon EC2 to control who has access to specific Amazon EC2 instances?

A. Security Groups
B. IAM System
C. SSH keys
D. Windows passwords

Answer: B. IAM System

Computer Science & Information Technology

You might also like to view...

Sun NFS aims to support heterogeneous distributed systems by the provision of an operating system-independent file service. What are the key decisions that the implementer of an NFS server for an operating system other than UNIX would have to take? What constraints should an underlying filing system obey to be suitable for the implementation of NFS servers?

What will be an ideal response?

Computer Science & Information Technology

Cutting moves the selected content, whereas copying duplicates the selected content. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology