What is a Security Group?
A. None of these.
B. A list of users that can access Amazon EC2 instances.
C. An Access Control List (ACL) for AWS resources.
D. It acts as a virtual firewall that controls the traffic for one or more instances.
Answer: D. It acts as a virtual firewall that controls the traffic for one or more instances.
You might also like to view...
Project status monitoring is one application of the ___________ process.
Fill in the blank(s) with the appropriate word(s).
Data hiding (which means that critical data stored inside the object is protected from code outside the object) is accomplished in Java by __________.
a. using the public access specifier on the class methods b. using the private access specifier on the class methods c. using the private access specifier on the class fields d. using the private access specifier on the class definition
The VFS ________.
a) schedules disk I/O b) implements functions such as read and write c) interprets data from superblocks, files, inodes and directory entries d) all of the above
When opening a database from a trusted source, a user will need to click on ________ to fully open the file if a security message is displayed
Fill in the blank(s) with correct word