Which factors affect costs in the AWS Cloud? (Select TWO.)
A company needs to configure rules to identify threats and protect applications from malicious network access.
Which AWS service should the company use to meet these requirements?
A user wants to identify any security group that is allowing unrestricted incoming SSH traffic.
Which AWS service can be used to accomplish this goal?
A company needs to continuously monitor its environment to analyze network and account activity and identify potential security threats.
Which AWS service should the company use to meet these requirements?