The security engineer is managing a traditional three-tier web application that is running on Amazon EC2 instances. The application has become the target of increasing numbers of malicious attacks from the internet.
What steps should the security engineer take to check for known vulnerabilities and limit the attack surface? (Choose two.)
AgboolaKun
Highly Voted 5 months, 1 week agoc6ed25a
Most Recent 1 month, 1 week agoAamee
5 months, 1 week ago[Removed]
5 months, 1 week agooioi
5 months, 1 week ago