1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
USPshnik [31]
3 years ago
7

Two Auto Scaling applications, Application A and Application B, currently run within a shared set of subnets. A Solutions Archit

ect wants to make sure that Application A can make requests to Application B, but Application B should be denied from making requests to Application A. Which is the SIMPLEST solution to achieve this policy
Computers and Technology
1 answer:
likoan [24]3 years ago
5 0

Answer:

Using Network Access Control Lists (ACL) to allow/deny traffic based on application IP addresses

Explanation:

ALL Network Access Control List has has distinct inbound and outbound rules.

Each of these rules are configured to either allow or deny traffic.

This is the best and easiest way to achieve the task at hand.

The Network ACL will be configured to allow inbound and outbound traffic for Application A to send and receive requests and only inbound traffic will be allowed for Application B to receive requests only from A

You might be interested in
Imagine a typical website that works as a storefront for a business, allowing customers to browse goods online, place orders, re
Gwar [14]

Answer: See explanation

Explanation:

Following the information given in the question, the testing process for the website will include testing the links that are on the site.

Another that ng to test is to check if the menus and the buttons are working properly. Furthermore, the layout should be ensured that it's consistent as well as the ease with which the website can be used.

5 0
3 years ago
Do the police check your mobile device during police checks?
Marat540 [252]
it depends............

4 0
3 years ago
Read 2 more answers
10 POINTS
Sunny_sXe [5.5K]

Answer:

True

Explanation:

They want to focus on their customers and their interests, so they market their products to a specific audience. hope this helps :)

4 0
3 years ago
What validation type would you use to check that numbers fell within a certain range? a) range check b)presence check c)check di
olga2289 [7]

Answer:

a) range check

Explanation:

Validation can be defined as an automatic computer check that is designed to ensure any data entered is sensible, consistent, feasible and reasonable.

Basically, there are five (5) main validation methods and these includes;

I. Presence check: checks that the user enters (inputs) data into the field. It ensures a field isn't accidentally left blank.

II. Length check: checks that the data entered isn't too short or too long. It ensures that the data meets the minimum characters.

III. Type check: checks that the data entered is in the right format. For example, string, integer, float, etc.

IV. Check digit: checks that the digit entered is acceptable and consistent with the rest of the digits.

V. Range check: checks that the data entered is between the accepted lower (minimum) and upper (maximum) level.

Hence, range check is a validation type you would use to check that numbers fell within a certain range.

For example, 0 < x > 1000 is a range check.

4 0
3 years ago
What specific database stores local user accounts on local computers, and allows users to sign in to and access resources only o
Yuki888 [10]

Answer:

The Security Account Manager

Explanation:

The Security Account Manager (SAM), This is a database file found in Windows Operating Systems.... Windows XP, Windows Vista, Windows 7, 8.1 and 10 that stores users' passwords. It can be used to authenticate local and remote users. It is  an important and vital component of how Windows stores passwords locally on the computer.

5 0
3 years ago
Other questions:
  • what is it called when someone uses software to run multiple operating systems on one computer at the same time? A.functional vi
    9·1 answer
  • Would these statements cause an error? Why or why not? int year = 2019; int yearNext = 2020; int &amp; ref = year; &amp; ref = y
    7·1 answer
  • How many responses does a computer expect to receive when it broadcasts an ARP request?why?
    12·1 answer
  • Show the stack with all activation record instances, including static and dynamic chains, when execution reaches position 1 in t
    6·1 answer
  • In the formula "=A3/B3", what part of the formula is the "/"?<br><br> A)An operator<br> B)An operand
    5·2 answers
  • Any kind of brances in science
    13·1 answer
  • Recall that in C++ there is no check on an array index out of bounds. However, during program execution, an array index out of b
    9·1 answer
  • Briefly describe the fundamental differences between project-based and product-based Software Engineering.
    10·1 answer
  • Which statements about grades are accurate? Check all that apply. Grades help indicate how well a student is understanding a cer
    13·1 answer
  • What happens on your screen when you click on the eyedropper tool in Scratch? The background of your scene will become transpare
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!