A company deployed an Amazon EC2 instance to a VPC on AWS. A recent alert indicates that the EC2 instance is receiving a suspicious number of requests over an open TCP port from an external source. The TCP port remains open for long periods of time.
The company's security team needs to stop all activity to this port from the external source to ensure that the EC2 instance is not being compromised. The application must remain available to other users.
Which solution will meet these requirements?
kiev
Highly Voted 3 years, 8 months agoRaphaello
Most Recent 1 year, 4 months agoredelephant802
1 year, 7 months agoHoward1987
1 year, 7 months agopupsik
1 year, 8 months agoNoexperience
1 year, 10 months agohowchan
1 year, 7 months agoITGURU51
2 years, 2 months agoKezuko
2 years, 2 months agoNan001
2 years, 4 months agoJimmy123
2 years, 5 months agoSmartphone
2 years, 5 months agoboooliyooo
2 years, 5 months agoCallMeHerb
2 years, 6 months agomust_be_rohit
2 years, 6 months agoluis12345
2 years, 5 months agomaddyr
2 years, 7 months agodcasabona
2 years, 11 months agoxaocho
2 years, 11 months agosapien45
2 years, 11 months ago