You can use _____ and _____ to help secure the instances in your VPC,
A. security groups and multi-factor authentication
B. security groups and 2-Factor authentication
C. security groups and biometric authentication
D. security groups and network ACLs
Answer: D. security groups and network ACLs
Computer Science & Information Technology
You might also like to view...
The scope of a full _____ addresses the health and safety of all workers.
a. business initiation plan b. business valuation plan c. business improvement plan d. business continuity plan
Computer Science & Information Technology
Only two test cases are required to completely test a search, a value that is in the array (true) and a value that is not in the array (false).
Answer the following statement true (T) or false (F)
Computer Science & Information Technology