
Answer-first summary for fast verification
Answer: Use Amazon Route 53 Resolver DNS Firewall. Add a rule to a rule group to use the AWSManagedDomainsBotnetCommandandControl managed domain list with an action to block botnet traffic.
To protect against potential botnet command and control traffic from Amazon EC2 instances within a company's AWS environment, the most effective solution among the provided options is to use Amazon Route 53 Resolver DNS Firewall. This solution allows the company to add a rule to a rule group that utilizes the AWSManagedDomainsBotnetCommandandControl managed domain list, with an action set to block botnet traffic. This approach directly targets and mitigates the risk of botnet command and control traffic by preventing communication with known malicious domains. AWS Shield Advanced (Option A) provides DDoS protection but is not specifically designed to block botnet command and control traffic. AWS WAF Bot Control (Option C) is more focused on managing bot traffic to web applications rather than specifically blocking botnet command and control traffic. AWS Systems Manager (Option D) is a management service that can automate a variety of tasks but does not specifically offer a feature to block botnet traffic directly.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
Which solution will effectively safeguard the company's AWS environment against potential botnet command and control traffic originating from any Amazon EC2 instances?
A
Use AWS Shield Advanced. Activate Shield Advanced protections on the EC2 instances to filter and block botnet traffic.
B
Use Amazon Route 53 Resolver DNS Firewall. Add a rule to a rule group to use the AWSManagedDomainsBotnetCommandandControl managed domain list with an action to block botnet traffic.
C
Use AWS WAF Bot Control. Configure a managed rule group that uses an AWS managed rule set to block botnet traffic.
D
Use AWS Systems Manager. Run a Systems Manager Automation runbook on the EC2 instances to configure the instances to block botnet traffic.
No comments yet.