Which of the following security risks can result from the configuration in this scenario?

Posted by: Pdfprep Category: CAS-001 Tags: , ,

A company has a legacy virtual cluster which was added to the datacenter after a small company was acquired. All VMs on the cluster use the same virtual network interface to connect to the corporate data center LAN. Some of the virtual machines on the cluster process customer data, some process company financial data, and others act as externally facing web servers.

Which of the following security risks can result from the configuration in this scenario?
A . Visibility on the traffic between the virtual machines can impact confidentiality
B . NIC utilization can exceed 50 percent and impact availability
C . Shared virtual switches can negatively impact the integrity of network packets
D . Additional overhead from network bridging can affect availability

Answer: A

Leave a Reply

Your email address will not be published.