Hmm, I'm a bit unsure about this one. There are a few different tools mentioned that could be used. I think I'd want to verify the VPC route tables and then use the VPC flow logs to analyze the traffic that's being accepted or rejected by the security groups and network ACLs.
I'm feeling pretty confident about this one. The character and string manipulations are straightforward, I just need to pay close attention to the details.
Hmm, I'm not entirely sure about this one. The wording is a bit confusing, and I'm not familiar with some of the terms used. I'll have to read through it a few times.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Monroe
4 months agoIzetta
4 months agoLynelle
4 months agoCrissy
4 months agoCherelle
4 months agoAllene
5 months agoArdella
5 months agoGraciela
5 months agoPansy
5 months agoFletcher
5 months agoGladys
5 months agoGlory
5 months agoBrinda
5 months ago