
Ultimate access to all questions.
A company has deployed Linux-based application instances on EC2 in a private subnet and a Linux bastion host in a public subnet within a VPC. The solutions architect must establish secure connectivity from the on-premises network to the bastion host and subsequently to the application servers. What steps should be taken to configure the security groups for this access?
A
Modify the bastion host's security group to permit inbound connections from a defined range.
B
Adjust the bastion host's security group to allow inbound connections from the company's internal IP range.
C
Update the bastion host's security group to accept inbound connections from the company's external IP range.
D
Change the application instances' security group to enable inbound SSH connections from the bastion host's IP address.