Complete the code to allow inbound HTTP traffic on port 80.
SecurityGroupIngress: - IpProtocol: "tcp" FromPort: [1] ToPort: 80 CidrIp: "0.0.0.0/0"
Port 80 is the standard port for HTTP traffic, so it must be set as the FromPort to allow inbound HTTP.
Complete the code to allow outbound traffic to any IP on all ports.
SecurityGroupEgress: - IpProtocol: "-1" FromPort: 0 ToPort: [1] CidrIp: "0.0.0.0/0"
Port 65535 is the highest port number, so setting ToPort to 65535 allows all ports outbound.
Fix the error in the inbound rule to allow HTTPS traffic on port 443.
SecurityGroupIngress: - IpProtocol: "tcp" FromPort: [1] ToPort: [2] CidrIp: "0.0.0.0/0"
HTTPS traffic uses port 443, so both FromPort and ToPort must be set to 443 to allow HTTPS inbound.
Fill both blanks to allow inbound SSH traffic only from a specific IP range.
SecurityGroupIngress: - IpProtocol: [1] FromPort: [2] ToPort: 22 CidrIp: "203.0.113.0/24"
SSH uses TCP protocol on port 22, so IpProtocol must be "tcp" and FromPort must be 22.
Fill all three blanks to create an outbound rule allowing DNS queries over UDP port 53.
SecurityGroupEgress: - IpProtocol: [1] FromPort: [2] ToPort: [3] CidrIp: "0.0.0.0/0"
DNS queries typically use UDP protocol on port 53, so IpProtocol is "udp" and both FromPort and ToPort are 53.