
Answer-first summary for fast verification
Answer: Create an AWS WAF web ACL that includes rules to block SQL injection attacks., Replace the NLB with an Application Load Balancer., Associate the AWS WAF web ACL with the Application Load Balancer.
To prevent SQL injection attacks on the application, the following steps should be taken: First, create an AWS WAF web ACL that includes rules to block SQL injection attacks (Option A). This will help in filtering out malicious SQL queries. Second, replace the Network Load Balancer (NLB) with an Application Load Balancer (ALB) (Option C). ALB supports AWS WAF, which NLB does not, making it necessary for the integration of AWS WAF for web application protection. Third, associate the AWS WAF web ACL with the Application Load Balancer (Option E). This association will enable the ALB to use the AWS WAF rules to inspect and block SQL injection attempts. Options B, D, and F are not directly related to the immediate requirement of preventing SQL injection attacks in the described scenario. Creating an Amazon CloudFront distribution (Option B) and associating the AWS WAF web ACL with it (Option F) could be part of a broader security strategy but are not necessary for the specific requirement of preventing SQL injection attacks on the internal application. Associating the AWS WAF web ACL with the NLB (Option D) is not possible because NLB does not support AWS WAF.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
No comments yet.
A company hosts an internal web-based application for employees on its on-premises network, accessible via a VPN. The application operates on a fleet of Amazon EC2 instances within a private subnet, behind a Network Load Balancer (NLB) in the same subnet, and is managed by an Amazon EC2 Auto Scaling group. Following a recent SQL injection attack, a network engineer needs to implement measures to prevent future SQL injection attacks.
Which three steps should be taken to meet these requirements?
A
Create an AWS WAF web ACL that includes rules to block SQL injection attacks.
B
Create an Amazon CloudFront distribution. Specify the EC2 instances as the origin.
C
Replace the NLB with an Application Load Balancer.
D
Associate the AWS WAF web ACL with the NLB.
E
Associate the AWS WAF web ACL with the Application Load Balancer.