Complete the code to specify that NACLs are {{BLANK_1}}.
Network ACLs in AWS are [1], meaning they evaluate traffic in both directions independently.
NACLs are stateless, so they check inbound and outbound rules separately without remembering previous traffic.
Complete the code to explain how NACLs handle return traffic: NACLs require explicit {{BLANK_1}} rules for outbound traffic.
Because NACLs are stateless, they require explicit [1] rules to allow return traffic back out.
Return traffic must be allowed by outbound rules because NACLs do not remember inbound traffic.
Fix the error in the statement about NACLs: 'NACLs automatically allow return traffic because they are {{BLANK_1}}.'
NACLs automatically allow return traffic because they are [1].
This statement is incorrect because NACLs are stateless and do not automatically allow return traffic.
Fill both blanks to complete the NACL rule example: 'To allow HTTP traffic, add an inbound rule with protocol {{BLANK_1}} and port {{BLANK_2}}.'
To allow HTTP traffic, add an inbound rule with protocol [1] and port [2].
Protocol 6 is TCP, and port 80 is the standard port for HTTP traffic.
Fill all three blanks to complete the NACL outbound rule: 'Allow outbound DNS queries with protocol {{BLANK_1}}, port {{BLANK_2}}, and rule action {{BLANK_3}}.'
Allow outbound DNS queries with protocol [1], port [2], and rule action [3].
Protocol 6 (TCP), port 53 (DNS), and rule action 'allow'. DNS primarily uses UDP (17), but TCP is also used and matches the available options.