A company has a web application that is deployed in a VPC. Inbound traffic to this web application comes in through an internet gateway and arrives at a Network Load Balancer (NLB). From there, the traffic travels to multiple Amazon EC2 instances in two private subnets. The company wants to perform deep packet inspection on the inbound traffic to identify potential hacking attempts.
Which solution meets these requirements?
A. Configure AWS Shield for the VPC.
B. Use AWS Network Firewall on the VPC. Configure Network Firewall to perform deep packet inspection.
C. Use AWS Network Firewall on the subnets. Configure Network Firewall to perform deep packet inspection.
D. Set up Traffic Mirroring on an inbound port of the NLB.
Which solution meets these requirements?
A. Configure AWS Shield for the VPC.
B. Use AWS Network Firewall on the VPC. Configure Network Firewall to perform deep packet inspection.
C. Use AWS Network Firewall on the subnets. Configure Network Firewall to perform deep packet inspection.
D. Set up Traffic Mirroring on an inbound port of the NLB.