exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 194 discussion

Actual exam question from CompTIA's SY0-701
Question #: 194
Topic #: 1
[All SY0-701 Questions]

A security team is setting up a new environment for hosting the organization's on-premises software application as a cloud-based service. Which of the following should the team ensure is in place in order for the organization to follow security best practices?

  • A. Virtualization and isolation of resources
  • B. Network segmentation
  • C. Data encryption
  • D. Strong authentication policies
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
nillie
Highly Voted 6 months, 3 weeks ago
Selected Answer: A
The security team should ensure that all of the following are in place, but the most comprehensive answer that addresses cloud-based services is: A. Virtualization and isolation of resources In a cloud-based environment, virtualization and isolation of resources are critical to maintaining security best practices. Virtualization allows multiple workloads to run on the same physical infrastructure while keeping them isolated from each other, which is a foundational practice in cloud environments to prevent data leakage or unauthorized access between different tenants or applications.
upvoted 6 times
...
585402e
Most Recent 2 months, 1 week ago
Selected Answer: C
Since it is in the Cloud and theoretically can be compromised at some point, in my opinion, the first thing that needs to be ensured is the confidentiality of the data. Therefore, the data should always be encrypted.
upvoted 1 times
...
fd91c58
2 months, 2 weeks ago
Selected Answer: C
The best answer is C. Data encryption. Here's why: Virtualization and isolation of resources: While important for resource management and security, it doesn't directly address the protection of data in transit or at rest. Network segmentation: This helps in limiting the spread of potential breaches but doesn't directly protect the data itself. Data encryption: This is crucial for protecting data both in transit and at rest, ensuring that even if data is intercepted or accessed without authorization, it remains unreadable. Strong authentication policies: These are essential for controlling access to the cloud environment but don't directly protect the data once it is accessed. this makes sense to me data encryption is the basic level of security best practices.
upvoted 1 times
...
Glacier88
8 months ago
Selected Answer: A
Virtualization and isolation of resources: This ensures that each application or tenant within the cloud environment is running in its own isolated virtual environment, preventing unauthorized access or interference from other users. Network segmentation: While network segmentation is a valuable security measure, it's not as directly related to the security of the on-premises software application itself. It's more about protecting the overall network infrastructure. Data encryption: Data encryption is crucial for protecting sensitive data both at rest and in transit, but it's not the primary concern for ensuring a secure cloud-based environment. Strong authentication policies: Strong authentication policies are essential for controlling access to the cloud environment, but they don't address the isolation and protection of resources within that environment.
upvoted 2 times
...
Yoming
8 months, 1 week ago
Selected Answer: B
Network segmentation would provide a barrier between the hosting software and internal company resources
upvoted 1 times
RobJob
7 months ago
I’m not sure how network segmentation can be applicable when it is a cloud environment.
upvoted 4 times
...
...
EfaChux
8 months, 1 week ago
Selected Answer: C
Setting up a private cloud means your data will be traveling over the internet, encryption seems like a best practice to me when compared to virtualization and isolation which could already be in place for the on-premise architecture
upvoted 3 times
...
Crucible_Bro
8 months, 2 weeks ago
Selected Answer: A
I'm not overly smart about this type of thing, but I *feel* like this is one of those trick questions. In order to get any sort of cloud services up you'll need virtualization. The isolation of resources may be part of the security aspect but I am not entirely sure. D is probably a stronger answer but I don't necessarily disagree with A.
upvoted 4 times
...
a4e15bd
8 months, 2 weeks ago
D. Strong authentication policies. Ensuring a strong user authentication is crucial to prevent unauthorized access to the cloud environment. This forms the first line of defense in securing the system.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago