1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
USPshnik [31]
3 years ago
7

Two Auto Scaling applications, Application A and Application B, currently run within a shared set of subnets. A Solutions Archit

ect wants to make sure that Application A can make requests to Application B, but Application B should be denied from making requests to Application A. Which is the SIMPLEST solution to achieve this policy
Computers and Technology
1 answer:
likoan [24]3 years ago
5 0

Answer:

Using Network Access Control Lists (ACL) to allow/deny traffic based on application IP addresses

Explanation:

ALL Network Access Control List has has distinct inbound and outbound rules.

Each of these rules are configured to either allow or deny traffic.

This is the best and easiest way to achieve the task at hand.

The Network ACL will be configured to allow inbound and outbound traffic for Application A to send and receive requests and only inbound traffic will be allowed for Application B to receive requests only from A

You might be interested in
What will be the output of using the element in the given HTML code?
MatroZZZ [7]

Answer:

i think c.

Explanation:

6 0
3 years ago
Your friend want to make a copy of your new game you bought the previous day .
Lisa [10]

Answer:

It is copyright infringement

Explanation:

Required

Why you should prevent your friend from copying a software you bought

When you purchase a software, you claim ownership of the software (for using the software on your devices); however, your ownership is not a full ownership because the software is an intellectual property of the developer.

This means that, you cannot copy or redistribute the software without the consent of the developer. Doing so, without getting consent, is a copyright infringement.

3 0
3 years ago
Why is it important to follow a consistent naming convention for variables?
Vitek1552 [10]

Answer:

today I am going to be out for the job interview so if I will make it happen I am going to New Orleans this week to get the kids to work on the spot and I can get ready to go out to dinner and I can make a few more people

4 0
2 years ago
An expansion ____ is a long-narrow socket on the motherboard into which you can plug an expansion card.
Valentin [98]
The answer is
An expansion Slot
7 0
3 years ago
Benching system are prohibited in
enyata [817]
Providence yep ur welcome
3 0
3 years ago
Other questions:
  • Allow chrome to access the network in your firewall or antivirus settings. if it is already listed as a program allowed to acces
    15·1 answer
  • What traits make an effective leaader
    9·2 answers
  • Secure Multipurpose Internet Mail Extensions builds on the encoding format of the MIME protocol and uses digital signatures base
    15·1 answer
  • James gets a job at a multinational corporation. On his first day at work, he finds out that the numerical code assigned by the
    10·1 answer
  • Susan teaches many individuals and business professionals how, why, and the benefits and challenges to using social media. Of th
    15·1 answer
  • Sam wants to use the rule of thirds to capture the essence of his image. How will he apply this rule in his image to get a pleas
    6·1 answer
  • Discuss the causes ,symptoms, preventive measures and treatment of AIDS​
    6·2 answers
  • 3.There are 3 arrays that hold related data at each position (parallel). The first array holds product codes. The second holds t
    7·1 answer
  • Give 5 characteristics of bad capacitor<br> give 5 characteristics of good capacitor
    10·1 answer
  • Exam Instructions
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!