Q: 11
A company has a large fleet of Amazon Linux 2 Amazon EC2 instances that run an application
processing sensitive dat
a. Compliance requirements include no exposed management ports, full session logging, and
authentication through AWS IAM Identity Center. DevOps engineers occasionally need access for
troubleshooting.
Which solution will provide remote access while meeting these requirements?
Options
Discussion
C. I've seen this setup is the only way to avoid open ports and log sessions. Disagree?
C . D looks tempting but even a second of open ports violates the "no exposed management ports" part.
Hard to say, C, but if compliance is really strict on never exposing ports then D can't be it.
Option C. D tries to trick you with "temporarily open remote access" but that's not compliant for sensitive data, pretty sure.
C tbh. Only Session Manager setup (C) hits all requirements with zero management port exposure. I don't see the others fitting compliance.
Saw something just like this in a mock, C is correct. Meets every compliance item without opening management ports at all.
Makes sense to me, C. No open ports at any time and session logging works cleanly with SSM Session Manager. Disagree?
Its C. Session Manager is designed for secure, compliant remote access without opening management ports. D is a trap since you should never open ports just for troubleshooting in sensitive environments. IAM Identity Center works smoothly with SSM roles too. Seen similar Qs in practice tests.
Its C since even a brief opening of ports (like D) breaks the "no exposed management ports" rule, pretty sure that's what flips it for strict compliance cases.
D , but C is probably safer for strict compliance since D still exposes ports briefly.
Be respectful. No spam.