The security engineer is managing a traditional three-tier web application that is running on Amazon EC2 instances. The application has become the target of increasing numbers of malicious attacks from the internet.
What steps should the security engineer take to check for known vulnerabilities and limit the attack surface? (Choose two.)
AgboolaKun
Highly Voted 1 week, 1 day agoAamee
Most Recent 1 week, 3 days ago[Removed]
1 week, 4 days agooioi
1 week, 5 days ago