exam questions

Exam CSSLP All Questions

View all questions & answers for the CSSLP exam

Exam CSSLP topic 2 question 51 discussion

Actual exam question from ISC's CSSLP
Question #: 51
Topic #: 2
[All CSSLP Questions]

What are the security advantages of virtualization, as described in the NIST Information Security and Privacy Advisory Board (ISPAB) paper "Perspectives on
Cloud Computing and Standards"? Each correct answer represents a complete solution. Choose three.

  • A. It increases capabilities for fault tolerant computing.
  • B. It adds a layer of security for defense-in-depth.
  • C. It decreases exposure of weak software.
  • D. It decreases configuration effort.
Show Suggested Answer Hide Answer
Suggested Answer: fault tolerant computing using rollback and snapshot features. Answer: D is incorrect. Virtualization increases configuration effort because of complexity of the 🗳️
The security advantages of virtualization are as follows: It adds a layer of security for defense-in-depth. It provides strong encapsulation of errors. It increases intrusion detection through introspection. It decreases exposure of weak software. It increases the flexibility for discovery. It increases capabilities for virtualization layer and composite system.

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
74gjd_37
5 months, 2 weeks ago
Selected Answer: BCD
The correct answers are: B. It adds a layer of security for defense-in-depth. C. It decreases exposure of weak software. D. It decreases configuration effort. Virtualization can help in the implementation of Defense-in-Depth, which is an information assurance strategy that provides multiple layers of defense/ protection against different kinds of cyber attacks or vulnerabilities. By dividing hardware into virtual components and running separate operating systems on each component, virtualization reduces the exposure to weak points present in previous technologies, since any kind of malware attack or vulnerability affecting one VM (virtual machine) does not necessarily affect other VMs running on the same physical server. Through Virtual Machine snapshots feature, it becomes easy for administrators to capture and restore entire application environments almost instantly providing elasticity toward development efforts as well making backup recovery much more manageable than traditional enterprise models where every application has its own piecemeal storage disk assigned to it.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago