Which of the following accurately reflects the access control mechanisms the Architect should verify?

1 Comment

  1. Betty
    Author

    I think the answer is:
    Inbound SG configuration on database servers Outbound SG configuration on application servers Inbound and outbound network ACL configuration on the database subnet Inbound and outbound network ACL configuration on the application server subnet

Leave a Reply

Your email address will not be published. Required fields are marked *

17 − four =