Select the correct set of options. These are the initial settings for the default security group:
A.
Allow no inbound traffic, Allow all outbound traffic and Allow instances associated with this security group
to talk to each other
B.
Allow all inbound traffic, Allow no outbound traffic and Allow instances associated with this security group
to talk to each other
C.
Allow no inbound traffic, Allow all outbound traffic and Does NOT allow instances associated with this
security group to talk to each other
D.
Allow all inbound traffic, Allow all outbound traffic and Does NOT allow instances associated with this
security group to talk to each other
I don’t think the answer is worded correctly. D is the answer.
http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_SecurityGroups.html#DefaultSecurityGroup
yes agree with Chef. Correct answer is D
default sg allows all ingress and all egress. so i feel d is the right one
Correct answer is A
Ans. A
can you explain why answer is A.
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-security.html#default-security-group
A default security group is named default, and it has an ID assigned by AWS. The following are the initial settings for each default security group:
Allow inbound traffic only from other instances associated with the default security group
Allow all outbound traffic from the instance
The default security group specifies itself as a source security group in its inbound rules. This is what allows instances associated with the default security group to communicate with other instances associated with the default security group.
Instances associated with a security group can’t talk to each other unless you add rules allowing it (exception: the default security group has these rules by default).
The question is related to the default group, so A
How is it A?
http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_SecurityGroups.html#DefaultSecurityGroup
By default, an outbound rule allows all outbound traffic. You can remove the rule and add outbound rules that allow specific outbound traffic only.
Instances associated with a security group can’t talk to each other unless you add rules allowing it (exception: the default security group has these rules by default).
Sorry. A is correct.
There is a rule in the ‘default security group’ — Source : sg-xxxxxxxx.
It will allow instances talk to each other under this rule.
So A.
A
Correct answer is A
Correct answer is A
A
A.
Allow no inbound traffic, Allow all outbound traffic and Allow instances associated with this security group
to talk to each other
A is the 100% correct answer
A
Your VPC includes a default security group whose initial rules are to deny all inbound traffic, allow all outbound traffic, and allow all traffic between instances in the group. You can’t delete this group; however, you can change the group’s rules. The procedure is the same as modifying any other security group. For more information, see
B.
Allow all inbound traffic, Allow no outbound traffic and Allow instances associated with this security group
to talk to each other
This is right answer. Please keep in mind default security group.
correct answer is C.
By default, no inbound traffic is allowed until you add inbound rules to the security
group.
By default, new security groups have an outbound rule that allows all outbound traffic.
You can remove the rule and add outbound rules that allow specific outbound traffic
only.
Instances associated with the same security group can’t talk to each other unless you add
rules allowing it (with the exception being the default security group)
Ans is A :
Your VPC includes a default security group whose initial rules are to deny all inbound traffic, allow all outbound traffic, and allow all traffic between instances in the group. You can’t delete this group; however, you can change the group’s rules. The procedure is the same as modifying any other security group. For more information, see Adding, Removing, and Updating Rules.
http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_SecurityGroups.html#DefaultSecurityGroup