A company hosts an application on Amazon EC2 that is subject to specific rules for regulatory compliance. One rule states that traffic to and from the workload must be inspected for network-level attacks. This involves inspecting the whole packet.
To comply with this regulatory rule, a security engineer must install intrusion detection software on a c5n.4xlarge EC2 instance. The engineer must then configure the software to monitor traffic to and from the application instances.
What should the security engineer do next?
[Removed]
Highly Voted 3 years, 9 months agopal40sg
Most Recent 2 years, 1 month agoITGURU51
2 years, 2 months agoAndyrajamma
2 years, 7 months agosapien45
2 years, 12 months agoTigerInTheCloud
3 years, 3 months agoJonfernz
3 years, 2 months agoRadhaghosh
3 years, 5 months agorefuz
3 years, 8 months agocldy
3 years, 8 months agoDayQuil
3 years, 9 months ago