You have used orchestrations to specify security lists, security rules, security IP lists, IP reservations, and storage volumes. You are now creating instances.
Which three relationships (dependencies) must you define to ensure that the entire topology can be started and stopped without errors?
Select one or more of the following: