What should a solutions architect do to correct this issue?

2 Comments

  1. Ann
    Author

    I rank that the answer is:
    Create security group rules using the security group ID as the source or destination.

  2. Melissa
    Author

    I systematize that the answer is:
    Create security group rules using the security group ID as the source or destination.

Leave a Reply to Melissa Cancel reply

Your email address will not be published. Required fields are marked *

3 × 5 =