Per the AWS Acceptable Use Policy, penetration testing of EC2 instances:
A. May be performed by AWS, and will be performed by AWS upon customer request.
B. May be performed by AWS, and is periodically performed by AWS.
C. Are expressly prohibited under all circumstances.
D. May be performed by the customer on their own instances with prior authorization from AWS.
E. May be performed by the customer on their own instances, only if performed from EC2 instances
Answer: D. May be performed by the customer on their own instances with prior authorization from AWS.
You might also like to view...
An operating system in a virtual machine accesses the resource that is presented to it by the Virtual Machine Monitor or _________
Fill in the blank(s) with the appropriate word(s).
It is helpful to look at the ________ row in the design grid in case a field may have the same name in multiple locations with different data in each
A) Table B) Criteria C) Show D) Field
A series of text links across the top or bottom of a webpage that, when clicked, will link to another webpage on the same website
a. Navigation bar b. Rich text links c. Address bar
What piece of addressing information should both the IPv4 host address and its default gateway share?
What will be an ideal response?