Posted by: Pdfprep
Post Date: November 12, 2020
A company Is seeing access requests by some suspicious IP addresses. The security team discovers the requests are horn different IP addresses under the same CIDR range.
What should a solutions architect recommend to the team?
A . Add a rule in the inbound table of the security group to deny the traffic from that CIDR range.
B . Add a rule In the outbound table of the security group to deny the traffic from that CIDR range
C . Add a deny rule in the Inbound table of the network ACL with a lower rule number than other rules.
D . Add a deny rule in the outbound table of the network ACL with a tower rule number than other rules.
Answer: C
Leave a Reply