Home/Exams/Security Groups
Real Exam ScenarioSecurity Groups

To allow a fleet of web servers to communicate with a database cluster securely, which source should be used in the database security group's inbound rule?