Per the AWS Acceptable Use Policy, penetration testing of EC2 instances:

A. May be performed by AWS, and will be performed by AWS upon customer request.
B. May be performed by AWS, and is periodically performed by AWS.
C. Are expressly prohibited under all circumstances.
D. May be performed by the customer on their own instances with prior authorization from AWS.
E. May be performed by the customer on their own instances, only if performed from EC2 instances


Answer: D. May be performed by the customer on their own instances with prior authorization from AWS.

Computer Science & Information Technology

You might also like to view...

An operating system in a virtual machine accesses the resource that is presented to it by the Virtual Machine Monitor or _________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

It is helpful to look at the ________ row in the design grid in case a field may have the same name in multiple locations with different data in each

A) Table B) Criteria C) Show D) Field

Computer Science & Information Technology

A series of text links across the top or bottom of a webpage that, when clicked, will link to another webpage on the same website

a. Navigation bar b. Rich text links c. Address bar

Computer Science & Information Technology

What piece of addressing information should both the IPv4 host address and its default gateway share?

What will be an ideal response?

Computer Science & Information Technology