Table borders can be changed from the ________ tab

A) Insert B) Layout C) Design D) Page Layout


C

Computer Science & Information Technology

You might also like to view...

Words entered in the Search for box of the Clip Art pane are known as ________

A) request words B) keywords C) focus words D) search words

Computer Science & Information Technology

Variables and constants declared within a method are ____ only within that method.

A. in vision B. in range C. in scope D. in group

Computer Science & Information Technology

You can use common external commands, such as find and sed, in your Bash scripts.

a. true b. false

Computer Science & Information Technology

You've been hired to enhance the overall security posture for a very large e-commerce site They have a well architected multi-tier application running in a VPC that uses ELBs in front of both the web and the app tier with static assets served directly from S3 They are using a combination of RDS and DynamoOB for their dynamic data and then archiving nightly into S3 for further processing with EMR They are concerned because they found questionable log entries and suspect someone is attempting to gain unauthorized access. Which approach provides a cost effective scalable mitigation to this kind of attack?

A. Recommend that they lease space at a DirectConnect partner location and establish a 1G DirectConnect connection to theirvPC they would then establish Internet connectivity into their space, filter the traffic in hardware Web Application Firewall (WAF). And then pass the traffic through the DirectConnect connection into their application running in their VPC, B. Add previously identified hostile source IPs as an explicit INBOUND DENY NACL to the web tier subnet. C. Add a WAF tier by creating a new ELB and an AutoScalmg group of EC2 Instances running a host-based WAF They would redirect Route 53 to resolve to the new WAF tier ELB The WAF tier would thier pass the traffic to the current web tier The web tier Security Groups would be updated to only allow traffic from the WAF tier Security Group D. Remove all but TLS 1 2 from the web tier ELB and enable Advanced Protocol Filtering This will enable the ELB itself to perform WAF functionality.

Computer Science & Information Technology