Which of the following cannot be used in Amazon EC2 to control who has access to specific Amazon EC2 instances?

A. Security Groups
B. IAM System
C. SSH keys
D. Windows passwords


Answer: B. IAM System

Computer Science & Information Technology

You might also like to view...

When you using the address element, the address text is displayed in _____ by default.

A. bold B. underline C. italics D. bold italics

Computer Science & Information Technology

This is the Point-to-Point Protocol over Ethernet.

What will be an ideal response?

Computer Science & Information Technology

The ________ allows you to type a URL in your browser instead of an IP address.

a. DNS (Domain Name System) b. Hypertext c. ICANN d. TLD (top-level domain)

Computer Science & Information Technology

Which of the following protocols is MOST commonly used for the transfer of router configuration files?

A. SSL B. TFTP C. DNS D. IMAP

Computer Science & Information Technology