1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
USPshnik [31]
3 years ago
7

Two Auto Scaling applications, Application A and Application B, currently run within a shared set of subnets. A Solutions Archit

ect wants to make sure that Application A can make requests to Application B, but Application B should be denied from making requests to Application A. Which is the SIMPLEST solution to achieve this policy
Computers and Technology
1 answer:
likoan [24]3 years ago
5 0

Answer:

Using Network Access Control Lists (ACL) to allow/deny traffic based on application IP addresses

Explanation:

ALL Network Access Control List has has distinct inbound and outbound rules.

Each of these rules are configured to either allow or deny traffic.

This is the best and easiest way to achieve the task at hand.

The Network ACL will be configured to allow inbound and outbound traffic for Application A to send and receive requests and only inbound traffic will be allowed for Application B to receive requests only from A

You might be interested in
Types of antivirus explain them
Veronika [31]

Answer: an antivirus is a type of program designed  to protect computers from  viruses, spyware, botnets, rootkits, keyloggers and such. There are many versions and types of anti-virus programs which can be very helpful.

Such as:

Norton.

Kaspersky.

Ad Aware.

AVG

Mc Afee

Hope this helps u...

Explanation:

3 0
3 years ago
Karlie wants to eat a good breakfast before taking a test
babymother [125]
Yum sounds like a good idea
7 0
3 years ago
Read 2 more answers
Pressing and holding _______ while clicking enables you to select multiple contiguous files or folders.
liq [111]

Answer:

Hi LizBiz! The answer is Ctrl key on Windows, or Command key for Mac.

Explanation:

The Ctrl (Windows) key or equivalent Command key on Mac has a special purpose which allows special operations to be performed when combined with another action, such as clicking on multiple pictures or files for selection.

8 0
3 years ago
Which of the following is considered a benefit of using simulation programs? a. They allow users to experience potentially dange
erica [24]

Answer:

All of the above

Explanation:

7 0
3 years ago
2. How do upgrading and retraining help you cope with change?
Luden [163]
<h2>Upgrading and retraining are mandatory to move along with the world.</h2>

Explanation:

Let us understand the term deeply,

Upgrading - Updating yourself with the latest

Retraining - learning new skills

Let me give you a real-life example which is nothing but "mobiles". If you are not updated then:

  • you will sit with mobile to make calls and
  • do money transactions only by stepping into the bank,
  • connect with people only through calls or directly visiting them,
  • distance break up the relationship,
  • booking tickets in classical way, etc.

These could be done in one touch if you have latest mobile with necessary applications.

In a similar way, we need to get retrained to get to learn new skills, technologies so that we can do our job the best, to be on track, be productive, convert your valuable knowledge in terms of money, to be peaceful in day today transactions, etc.

7 0
3 years ago
Other questions:
  • I've this assignment due before 7 am. Please help, me.
    9·1 answer
  • Who should get the copyright credit for a piece of computer art: the CPU, the software, or the programmer? Explain your reasonin
    7·1 answer
  • What is Processor to Memory Mismatch problem?
    15·1 answer
  • Explain each of the three important concepts behind the Federal Networking Council's definition of the term Internet. Explain ho
    8·1 answer
  • How can you skillfully use the internet for research
    7·1 answer
  • What is the best way to locate where my C program gets into an infinite loop
    5·1 answer
  • What is a column in a table
    10·2 answers
  • How do i use a computer (i'm 99999 years old)
    8·2 answers
  • By convention only, either the first usable address or the last usable address in a network is assigned to the router (gateway)
    11·1 answer
  • What technology does kroger’s edge technology and amazon’s just walk out technology leverage?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!