Answer:
Option B and Option E is correct.
Explanation:
A client is worried that anyone other than authorised admins efforts to control the instances of the Linux browser in its VPC. So, they query what kind of network control monitoring can be applied. The user then suggested that the community of instances set up a Flow Log which is sent to CloudWatch and allow use through OS-level monitoring resources like iptables to log events to CloudWatch or S3.