Which four steps do you perform next?

You have created two instances, A and B. You need to allow traffic between both instances. Instance A should
be open for traffic from the public internet over HTTP and HTTPS, and Instance B should only allow HTTP and
HTTPS traffic from a specific set of IP addresses. You have already created the security IP list with the
specified set of IP addresses.
Which four steps do you perform next?

You have created two instances, A and B. You need to allow traffic between both instances. Instance A should
be open for traffic from the public internet over HTTP and HTTPS, and Instance B should only allow HTTP and
HTTPS traffic from a specific set of IP addresses. You have already created the security IP list with the
specified set of IP addresses.
Which four steps do you perform next?

A.
Create security rules to enable traffic from the public internet list to Security List 3 over HTTP and HTTPS.

B.
Create security rules to enable traffic from the security IP list to Security List 1 over HTTP and HTTPS.

C.
Create security rules to enable traffic from the public internet list to Security List 1 over HTTP and HTTPS.

D.
Add instance A to another security list, say Security List 2.

E.
Add instance A and instance B to the same security list, say Security List 1.

F.
Add instance B to another security list, say Security List 3.

G.
Enable security rules to enable traffic from the public internet to Security List 2 over HTTP and HTTPS.



Leave a Reply 3

Your email address will not be published. Required fields are marked *


Turgun

Turgun

YES B D E G