Virtualization reduces a company's hardware attack surface by consolidating multiple physical systems into virtual machines (VMs) running on fewer physical servers. This minimizes the number of physical devices that need to be secured and maintained, reducing potential entry points for attackers.
B. Isolation:
Isolation involves separating systems, networks, or components to limit the exposure of hardware to threats. By isolating critical systems (e.g., via network segmentation, air-gapped systems, or access control), you reduce the number of entry points attackers can exploit — thereby decreasing the **hardware attack surface**.
Why not Virtualization...
It can help in isolating workloads and reducing physical hardware needs, but **virtual machines** share the same physical hardware, which can be a risk if not properly isolated. Thus, **virtualization alone** doesn't necessarily reduce the **hardware** attack surface unless combined with isolation.
This is AI answer and it perfectly makes sense.
I'll stick to B.
solation reduces the attack surface by limiting access and separating critical systems from less secure environments.
It prevents attackers from moving laterally or exploiting hardware vulnerabilities by keeping sensitive systems separate.
Isolation is the best option to decrease the company’s hardware attack surface because it involves separating systems or services to limit the scope of potential attacks. By isolating sensitive systems (e.g., placing them in separate network segments or on different machines), you reduce the number of potential entry points that attackers can exploit.
The correct answer is:
B. Isolation
Explanation:
Isolation is the best method to decrease a company's hardware attack surface. By isolating systems and devices, the company reduces the number of potential entry points for attackers. Isolation techniques include:
Network isolation: Segregating critical systems into separate network segments to prevent unauthorized access.
Physical isolation: Keeping sensitive hardware (e.g., servers or devices handling confidential data) in secure, access-controlled locations.
Logical isolation: Using software-based controls, such as virtual LANs (VLANs) or containerization, to separate workloads or processes.
By isolating hardware and systems, the attack surface is minimized because attackers are restricted from accessing unnecessary or unrelated systems.
The question key is "hardware", and Virtualization is the best solution to decresce company's hardware attack surface, because it reduces the number of hardware.
Virtualization is the most effective method for decreasing the company's hardware attack surface.
upvoted 2 times
...
This section is not available anymore. Please use the main Exam Page.SY0-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
ojones888
Highly Voted 6 months agoAliRi
Most Recent 1 week, 4 days agoprabh1251
3 months, 2 weeks ago93d818a
3 months, 2 weeks agomusaabokisec
5 months, 3 weeks agoEracle
5 months, 1 week agoFhaddad81
5 months, 3 weeks agoProudFather
6 months ago