You can use _____ and _____ to help secure the instances in your VPC,

A. security groups and multi-factor authentication
B. security groups and 2-Factor authentication
C. security groups and biometric authentication
D. security groups and network ACLs

Answer: D. security groups and network ACLs

Computer Science & Information Technology

You might also like to view...

The scope of a full _____ addresses the health and safety of all workers.

a. business initiation plan b. business valuation plan c. business improvement plan d. business continuity plan

Computer Science & Information Technology

Only two test cases are required to completely test a search, a value that is in the array (true) and a value that is not in the array (false).

Answer the following statement true (T) or false (F)

Computer Science & Information Technology