During a recent audit, the auditors cited the company's current virtual machine infrastructure as a concern. The auditors cited the fact that servers containing sensitive customer information reside on the same physical host as numerous virtual machines that follow less stringent security guild lines. Which of the following would be the best choice to implement to address this audit concern while maintain the current infrastructure?
A. Migrate the individual virtual machines that do not contain sensitive data to separate physical machines
B. Implement full disk encryption on all servers that do not contain sensitive customer data
C. Move the virtual machines that contain the sensitive information to a separate host
D. Create new VLANs and segment the network according to the level of data sensitivity
Answer: D. Create new VLANs and segment the network according to the level of data sensitivity
You might also like to view...
What type of Windows audit record describes events like an OS shutdown or a service being stopped?
A. An application log B. A security log C. A system log D. A setup log
Which of the following is the superclass constructor call syntax?
a. keyword super, followed by a dot (.) . b. keyword super, followed by a set of parentheses containing the superclass constructor arguments. c. keyword super, followed by a dot and the superclass constructor name. d. None of the above.