The security engineer is managing a traditional three-tier web application that is running on Amazon EC2 instances. The application has become the target of increasing numbers of malicious attacks from the internet.
What steps should the security engineer take to check for known vulnerabilities and limit the attack surface? (Choose two.)
AgboolaKun
Highly Voted 1 year agoAamee
Most Recent 1 year ago[Removed]
1 year agooioi
1 year ago