A is the correct. For example, if two virtual machines are located on the same physical machine there is no reason to route network traffic off the box and onto the network.Thus, they can communicate directly, and monitoring and filtering tools inline on the network (orattached to the routing/switching hardware) will never see the traffic. Ref: Security-Guidance-v4.0, Pg95.
The option that describes how virtual machine communications can bypass network security controls is:
A. VM communications may use a virtual network on the same hardware host.
Virtual machine communications within a virtual network on the same hardware host can bypass network security controls. Since the communication occurs within the virtualized environment of the host, it may not traverse the physical network where network security controls, such as firewalls or intrusion detection systems, are implemented. This intra-host communication can occur at the virtualization layer, enabling VMs to communicate with each other without being subject to the same network security controls and monitoring as traffic that flows through the physical network.
upvoted 2 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
saptati
Highly Voted 5 months, 1 week agoBrainiac
Most Recent 7 months ago