Security groups in cloud computing act as a virtual firewall for your servers to control inbound and outbound traffic. They are used to define rules that allow or deny network traffic to resources based on IP address, port, and protocol. The correct answer represents the purpose of a security group, while the incorrect answers either describe other security concepts or configurations not directly related to security groups.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the rules that can be defined in a security group?
Open an interactive chat with Bash
How do security groups differ from network access control lists (ACLs)?
Open an interactive chat with Bash
Can you apply security groups to multiple cloud resources at once?