Which of the following cannot be used in Amazon EC2 to control who has access to specific Amazon EC2 instances?
A. Security Groups
B. IAM System
C. SSH keys
D. Windows passwords
Answer: B. IAM System
Computer Science & Information Technology
You might also like to view...
When you using the address element, the address text is displayed in _____ by default.
A. bold B. underline C. italics D. bold italics
Computer Science & Information Technology
This is the Point-to-Point Protocol over Ethernet.
What will be an ideal response?
Computer Science & Information Technology
The ________ allows you to type a URL in your browser instead of an IP address.
a. DNS (Domain Name System) b. Hypertext c. ICANN d. TLD (top-level domain)
Computer Science & Information Technology
Which of the following protocols is MOST commonly used for the transfer of router configuration files?
A. SSL B. TFTP C. DNS D. IMAP
Computer Science & Information Technology