Question 124:
Your company has a set of EC2 Instances defined in AWS. They need to ensure that traffic packets are monitored and inspected for any security threats. Which of the following options is the most suitable?
Answer options:
A.Use a host-based intrusion detection system. B.Use AWS Shield. C.Use VPC Flow logs. D.Use Network Access control lists logging.