Which four steps do you perform next?

You have created two instances, A and B. you need to allow traffic between both instances. Instance A should be open for traffic from the public Internet over HTTP and HTTPS, and instance B should only allow HTTP and HTTPS traffic from a specific set of IP addresses. You have already created the security IP list with the specified set of IP addresses.

Which four steps do you perform next?

You have created two instances, A and B. you need to allow traffic between both instances. Instance A should be open for traffic from the public Internet over HTTP and HTTPS, and instance B should only allow HTTP and HTTPS traffic from a specific set of IP addresses. You have already created the security IP list with the specified set of IP addresses.

Which four steps do you perform next?

A.
Add instance A and instance B to the same security list, say Security List 1.

B.
Add instance A to another security list, say Security List 2.

C.
Add instance B to another security list, say Security List 3.

D.
Create security rules to enable traffic from the public Internet to Security List 1 over HTTP and HTTPS.

E.
Create security rules to enable traffic from the security IP list to Security List 1over HTTP and HTTPS.

F.
Create security rules to enable traffic from the public Internet to Security List 2 over HTTP and HTTPS.

G.
Create security rules to enable traffic from the public Internet list to Security List 3 over HTTP and HTTPS.



Leave a Reply 7

Your email address will not be published. Required fields are marked *


Rico

Rico

I Think ABEF

Mark

Mark

ACDG is my guess for this crappy Q&A. My answer assumes G is meaning the “security IP list” when G answer describes “public Internet list”

M

M

I THINK IT’S “AEBF”,
A- Add instance A and instance B to the same security list, say Security List 1
F- Create security rules to enable traffic from the security IP list to Security List 1 over HTTP and HTTPS.

>>> IN THIS CASE THE BOTH INSTANCES CAN TALK TO EACH OTHER, AND INSTANCE B ALLOWS HTTP AND HTTPS TRAFFIC FROM A SPECIFIC SET OF IP ADDRESSES <<>> IN THIS CASE WE HAVE INSTANCE A IN A SEPERATE SECURITY LIKS (Security List 2), AND IT ALLOWS HTTP AND HTTPS TRAFFIC FROM PUBLIC INTERNET. <<<

M

M

I THINK IT’S “AEBF”,
A- Add instance A and instance B to the same security list, say Security List 1
E- Create security rules to enable traffic from the security IP list to Security List 1over HTTP and HTTPS.
>>>IN THIS CASE THE BOTH INSTANCES CAN TALK TO EACH OTHER, AND INSTANCE B ALLOWS HTTP AND HTTPS TRAFFIC FROM A SPECIFIC SET OF IP ADDRESSES<<>>IN THIS CASE WE HAVE INSTANCE A IN A SEPERATE SECURITY LIKS (Security List 2), AND IT ALLOWS HTTP AND HTTPS TRAFFIC FROM PUBLIC INTERNET<<<

M

M

A,E
>>>IN THIS CASE THE BOTH INSTANCES CAN TALK TO EACH OTHER, AND INSTANCE B ALLOWS HTTP AND HTTPS TRAFFIC FROM A SPECIFIC SET OF IP ADDRESSES<<>>IN THIS CASE WE HAVE INSTANCE A IN A SEPERATE SECURITY LIKS (Security List 2), AND IT ALLOWS HTTP AND HTTPS TRAFFIC FROM PUBLIC INTERNET<<<

M

M

A,E
(((IN THIS CASE THE BOTH INSTANCES CAN TALK TO EACH OTHER, AND INSTANCE B ALLOWS HTTP AND HTTPS TRAFFIC FROM A SPECIFIC SET OF IP ADDRESSES)))
B,F
(((IN THIS CASE WE HAVE INSTANCE A IN A SEPERATE SECURITY LIKS (Security List 2), AND IT ALLOWS HTTP AND HTTPS TRAFFIC FROM PUBLIC INTERNET)))

M

M

The last comment is the right one, i don’t know why it tear up my answer.