Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Oracle Exam 1Z0-1067-23 Topic 4 Question 28 Discussion

Actual exam question for Oracle's 1Z0-1067-23 exam
Question #: 28
Topic #: 4
[All 1Z0-1067-23 Questions]

You launched a Linux compute instance to host the new version of your company website via Apache Httpd server on HTTPS (port 443). The instance is created in a public subnet along with other instances. The default security list associated to the subnet is:

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Orville
2 months ago
I'm leaning towards option B. Creating a dedicated NSG for the website seems like a more robust solution.
upvoted 0 times
Marsha
1 months ago
Definitely, option B is the way to go to ensure security for the company website.
upvoted 0 times
...
Gilma
1 months ago
I agree, creating a separate NSG for the website is a good way to control access.
upvoted 0 times
...
Dexter
2 months ago
Option B seems like the best choice. It will keep the other instances secure.
upvoted 0 times
...
...
Leonor
2 months ago
I'm not sure, but D also seems like a valid option. Adding a rule to the default security list could work too.
upvoted 0 times
...
Kayleigh
2 months ago
Haha, I bet the correct answer is going to be the one that takes the most work. That's how these exams always go!
upvoted 0 times
Basilia
1 months ago
D) In the default security list, add a stateful rule to allow ingress access on port 443. Create a new security list with a stateful rule to allow ingress access on port 443 and associate it with the public subnet.
upvoted 0 times
...
Orville
1 months ago
C) Create a Network Security Group (NSG), add a stateful rule to allow ingress access on port 443, and associate it with the instance that hosts the company website.
upvoted 0 times
...
Cordell
2 months ago
B) Create an NSG, add a stateful rule to allow ingress access on port 443, and associate it with the public subnet that hosts the company website.
upvoted 0 times
...
Audrie
2 months ago
A) You want to allow access to the company website from public internet without exposing websites eventually hosted on the other instances in the public subnet. Which action would you take to accomplish the task? (Choose the best answer.)
upvoted 0 times
...
...
Edna
3 months ago
I agree with Sheron. Creating an NSG and associating it with the public subnet seems like the right approach.
upvoted 0 times
...
Alease
3 months ago
Option D sounds good to me. Updating the default security list is a simple way to allow access to the website without affecting other instances.
upvoted 0 times
Aleta
1 months ago
Creating a Network Security Group and associating it with the instance hosting the website would also work well to restrict access to only that instance.
upvoted 0 times
...
Ezekiel
2 months ago
I agree with option D. It's important to ensure security while allowing access to the website from the public internet.
upvoted 0 times
...
Colton
2 months ago
I think creating a new security list with a stateful rule is a better option. It provides more control and isolation for the website instance.
upvoted 0 times
...
Daniel
2 months ago
Option D sounds good to me. Updating the default security list is a simple way to allow access to the website without affecting other instances.
upvoted 0 times
...
...
Sheron
3 months ago
I think the best answer is B.
upvoted 0 times
...
Alexis
3 months ago
I think option C is the best choice. Associating the NSG with the specific instance hosting the website is more secure than opening up the entire subnet.
upvoted 0 times
Kenneth
2 months ago
Yeah, it's important to limit access to only the necessary resources.
upvoted 0 times
...
Lonna
3 months ago
I agree, option C is definitely more secure.
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77