I agreed.
Traffic flows within a datacenter typically occur within the framework of one of
two models: East-West or North-South. The names may not be the most
intuitive, but the East-West traffic model means that data is flowing among
devices within a specific datacenter while North-South means that data is
flowing into the datacenter (from a system physically outside the datacenter) or
out of it (to a system physically outside the datacenter).
CompTIA® Network+ N10-008 Exam Cram by Emmett Dulaney
I am not 100% on this conclusion, but here's why I think it's A:
I think this question is tripping us up because we are looking for an instance of East-West traffic, while the question is really looking for a potential risk factor that could *compromise* EW traffic.
So, the actual answer should be A, since replication traffic could carry replicated EW traffic, despite its own nature being North-South. A tech must keep this in mind to protect the EW data of the main center.
upon research I got: East-west traffic refers specifically to the data flow occurring laterally within the confines of a data center, often between servers, databases, or VMs residing on different hosts within the same local network. In the course material I studied, it did not mention VMs specifically but now knowing this, the correct answer must be B
When evaluating a firewall to protect a datacenter’s east-west traffic, the most relevant factor to consider is:
B. Traffic between VMs running on different hosts
East-west traffic refers to the data flow within the datacenter, particularly between virtual machines (VMs) on different hosts. Protecting this internal traffic is crucial to prevent lateral movement of threats within the datacenter.
The best answer is B.
This is because a firewall designed to protect east-west traffic should be able to inspect and filter the traffic between VMs running on different hosts. This is essential for isolating workloads, investigating how applications traverse across the network, and preventing lateral movement to stop attackers from moving east-west through the system.
Which is why traffic between VM's running between different hosts should be a consideration when evaluating a firewall that protects internal (east-west) traffic.
Simplification , ignore the words East-West and replace them with internal network then read the question again, you will find that the question is about all the factors that can affect the internal network , answer being offsite replication which has the potential risk of bringing in malicious data
Answer being : A
In computer networking, east-west traffic is network traffic among devices within a specific data center. The other direction of traffic flow is north-south traffic, data flowing from or to a system physically residing outside the data center.
Answer is B. The data is NOT leaving the data centre so cant be A, C or D
B
East-west traffic specifically refers to the communication that occurs within a data center, between servers, applications, and virtual machines (VMs). It's distinct from north-south traffic, which involves traffic entering or exiting the data center from external networks.
Option B directly addresses this internal traffic flow, highlighting the importance of protecting communication between VMs residing on different hosts within the data center.
The answer is B. Traffic between VMs running on different hosts.
Here's why:
East-West Traffic: It refers to the internal communication within a data center, specifically between servers, virtual machines (VMs), and other infrastructure components.
I think the answer is A, not to get to technical, but East-West Traffic is normally communications between servers, and backups are usually sent to a 'server' and this scenario discusses a servers interaction with another server regardless if one was backup or not.
You are trying to ensure data can be made redundant through replication within the same network & not transported out (North-Bound) by router, or firewall protocols.
It's important to consider how to keep data secure in your network without letting remnants of said data having a risk of being tracked outside your firewall security.
You are trying to ensure data can be made redundant through replication within the same network & not transported out (North-Bound) by router, or firewall protocols.
It's important to consider how to keep data secure in your network without letting remnants being having a risk of being tracked outside your firewall security.
This section is not available anymore. Please use the main Exam Page.N10-008 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Spaghetti
Highly Voted 3 years, 3 months agoPongsathorn
3 years, 3 months agol3fty
Highly Voted 3 years, 1 month agoMusa007
2 years, 5 months agoI_Know_Everything_KY
1 year, 6 months agonl32
Most Recent 4 months, 2 weeks ago9cc2432
5 months, 1 week agoLe081
8 months agoTheMichael
10 months, 4 weeks agoGRMCGeeks
1 year, 1 month agoBracebg
1 year, 2 months agovinbra
1 year, 2 months agoPatrickH
1 year, 3 months ago4b819e6
1 year, 3 months agoNesi
1 year, 3 months agoJay987654
1 year, 3 months agoM3taCort3x
1 year, 4 months agosigmarseifer
1 year, 4 months agoMehsotopes
1 year, 5 months agoMehsotopes
1 year, 5 months ago