A web company is looking to implement an intrusion detection and prevention system into their deployed VPC. This platform should have the ability to scale to thousands of instances running inside of the VPC, How should they architect their solution to achieve these goals?
A. Configure an instance with monitoring software and the elastic network interface (ENI) set to promiscuous mode packet sniffing to see an traffic across the VPC,
B. Create a second VPC and route all traffic from the primary application VPC through the second VPC where the scalable virtualized IDS/IPS platform resides.
C. Configure servers running in the VPC using the host-based 'route' commands to send all traffic through the platform to a scalable virtualized IDS/IPS.
D. Configure each host with an agent that collects all network traffic and sends that traffic to the IDS/IPS platform for inspection.
Answer: D. Configure each host with an agent that collects all network traffic and sends that traffic to the IDS/IPS platform for inspection.
You might also like to view...
A(n) ____ is an ideal endpoint for VPN, which connects two companies' networks over the Internet.
A. DMZ B. extranet C. firewall D. intranet
If you have =D5*E5 in cell F5 and want to copy that down to F6 through F12, assuming data is contained in cells D6:E12, what is the quickest and easiest way to do that?
What will be an ideal response?
The test release of a product with a version number as the developers continue to refine the product and approach a final version is called a(n) ____________________ (two words).
Fill in the blank(s) with the appropriate word(s).
The term testimonial evidence refers to the process of examining malicious computer code.
a. true b. false