Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CCSK topic 1 question 178 discussion

Actual exam question from CSA's CCSK
Question #: 178
Topic #: 1
[All CCSK Questions]

CCM: A hypothetical company called "lnfrastructure4Sure" provides Infrastructure as a Service (IaaS) to its clients. A customer wants to review Infrastructure4Sure's hypervisor security implementation measures. Which of the following measures should Infrastructure4Sure implement?

  • A. Choose a hypervisor with a smaller footprint for a reduced attack surface.
  • B. Harden the hypervisor's configuration to increase areas of vulnerability (e.g., disabling memory sharing between VMs running within the same hypervisor hosts).
  • C. Connect unused physical hardware devices and enable clipboard or file-sharing services.
  • D. Monitor for signs of compromise by analyzing hypervisor logs on an ongoing basis.
  • E. A and D
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Mibu
3 months, 2 weeks ago
Selected Answer: E
Both A and D are valid options
upvoted 1 times
...
xvvirus
7 months, 2 weeks ago
E. A and D
upvoted 2 times
...
byfener
8 months, 3 weeks ago
Selected Answer: E
A and D A. Choose a hypervisor with a smaller footprint for a reduced attack surface. D. Monitor for signs of compromise by analyzing hypervisor logs on an ongoing basis. For securing the hypervisor in an Infrastructure as a Service (IaaS) environment, Infrastructure4Sure should choose a hypervisor with a smaller footprint, which reduces the attack surface by minimizing unnecessary components and functionalities that could be exploited. Additionally, Infrastructure4Sure should monitor for signs of compromise by regularly analyzing hypervisor logs. Monitoring logs helps detect any suspicious or unauthorized activities that might indicate a security breach or compromise.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...