What is a Security Group?

A. None of these.
B. A list of users that can access Amazon EC2 instances.
C. An Access Control List (ACL) for AWS resources.
D. It acts as a virtual firewall that controls the traffic for one or more instances.


Answer: D. It acts as a virtual firewall that controls the traffic for one or more instances.

Computer Science & Information Technology

You might also like to view...

Project status monitoring is one application of the ___________ process.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Data hiding (which means that critical data stored inside the object is protected from code outside the object) is accomplished in Java by __________.

a. using the public access specifier on the class methods b. using the private access specifier on the class methods c. using the private access specifier on the class fields d. using the private access specifier on the class definition

Computer Science & Information Technology

The VFS ________.

a) schedules disk I/O b) implements functions such as read and write c) interprets data from superblocks, files, inodes and directory entries d) all of the above

Computer Science & Information Technology

When opening a database from a trusted source, a user will need to click on ________ to fully open the file if a security message is displayed

Fill in the blank(s) with correct word

Computer Science & Information Technology