exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 382 discussion

Actual exam question from ISC's CISSP
Question #: 382
Topic #: 1
[All CISSP Questions]

Which of the following virtual network configuration options is BEST to protect virtual machines (VM)?

  • A. Data segmentation
  • B. Data encryption
  • C. Traffic filtering
  • D. Traffic throttling
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Nabs1
Highly Voted 2 years, 5 months ago
Selected Answer: A
Data segmentation seems more appropriate. I am loosing confidence in the correctness of the answers. If the answers ARE incorrect then it is damaging for everyone who are trying to learn here
upvoted 24 times
Jamati
2 years, 3 months ago
Why do you even look at the answer? Just go straight to the discussion.
upvoted 9 times
...
jackdryan
1 year, 9 months ago
C is correct
upvoted 1 times
...
...
BP_lobster
Highly Voted 2 years, 2 months ago
Selected Answer: C
Of the given answers only Traffic filtering is a valid Virtual Network Configuration for VM Protection. A. Data segmentation - not the same as network segmentation B. Data encryption - not a virtual network configuration C. Traffic filtering - is a virtual network configuration (e.g. via a firewall) D. Traffic throttling - better than A and B but C is best. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-125B.pdf VM Protection through Traffic Control Using Firewalls: "The primary use of a firewall is for traffic control. In a virtualized infrastructure, traffic control for VM protection is to be exercised for the following two scenarios: • Traffic flowing between any two virtual network segments (or subnets) • All traffic flowing into and out of a VM" Big thanks to Jay327 and CuteRabbit168 for their answers. Helped me out!
upvoted 21 times
...
ayadmawla
Most Recent 3 weeks, 6 days ago
Selected Answer: C
C. Traffic filtering Explanation: To protect virtual machines (VMs) in a virtual network, traffic filtering is the BEST configuration option. Here’s why: CISSP Domain Alignment: Domain 4 (Communication and Network Security) emphasizes proactive controls like firewalls and access control lists (ACLs) to block malicious traffic. Traffic filtering directly prevents unauthorized or harmful traffic (e.g., DDoS attacks, exploit attempts) from reaching VMs, reducing the risk of compromise.
upvoted 1 times
ayadmawla
3 weeks, 6 days ago
Why Traffic Filtering (C) is Best: Proactive Defense: Filters inspect and block malicious traffic (e.g., SQL injection, port scans) at the network boundary or between segments. Attack Prevention: Stops threats before they reach VMs, unlike encryption (B) or segmentation (A), which focus on containment or confidentiality. Granular Control: Enforces rules based on IP addresses, ports, protocols, or application-layer patterns (e.g., via a WAF). Why Not the Others?: A. Data Segmentation: Limits lateral movement but does not inherently block malicious traffic. Requires filtering to enforce security within segments. B. Data Encryption: Protects data confidentiality but does not prevent attacks (e.g., an encrypted payload with malware can still reach the VM). D. Traffic Throttling: Manages bandwidth for performance but has no security value.
upvoted 1 times
...
...
Ravnit
2 months, 1 week ago
Selected Answer: C
Traffic filtering helps in protecting VMs by controlling the incoming and outgoing network traffic based on an applied rule set, enhancing security by preventing unauthorized access and attacks.
upvoted 1 times
...
KJ44
3 months, 2 weeks ago
Selected Answer: A
To best protect virtual machines (VMs), the most effective virtual network configuration option is network segmentation, which involves dividing the virtual network into separate subnets to isolate traffic and restrict communication between different VM groups, significantly enhancing security by limiting potential attack vectors.
upvoted 1 times
...
Robin96
5 months ago
Selected Answer: C
C is correct
upvoted 1 times
...
deeden
6 months, 1 week ago
Selected Answer: A
C. This is crucial for controlling and monitoring network traffic, but it primarily addresses network-level threats and does not prevent or mitigate hypervisor-related attacks or VM-to-VM threats. A. This can prevent VMs from interacting with each other in unauthorized ways and reduce the risk of attacks like VM Escape, where a malicious VM could potentially access other VMs or the hypervisor. Segmentation also supports defense in depth by limiting the scope of an attack (attack surface), ensuring that if one segment is compromised, the attacker cannot easily move laterally to other segments.
upvoted 1 times
...
1460168
6 months, 3 weeks ago
Selected Answer: C
I vote for C, because data segmentation contains network segmentation, but this would us not help. We need to filter with a firewall.
upvoted 1 times
...
pete79
1 year ago
Selected Answer: C
Network works with the traffic, throttling does solve nothing, but filtering can pass or block traffic.
upvoted 2 times
...
GuardianAngel
1 year ago
Answer: traffic filtering 1. Access Control: Traffic filtering allows organizations to define specific rules that determine which types of traffic are allowed or blocked. For example, they can create rules to only allow traffic from trusted sources or specific IP addresses, while blocking traffic from potentially malicious sources. This helps prevent unauthorized access to the VMs. 2. Protection against Attacks: By implementing traffic filtering, organizations can block or restrict traffic associated with known attack vectors, such as denial-of-service (DoS) attacks, port scanning, or malware communication. This helps mitigate the risk of VMs being targeted and compromised by malicious activities. 3. Segmentation and Isolation: Traffic filtering enables organizations to segregate and isolate different VMs or groups of VMs within the virtual network. This helps contain any potential security breaches or incidents, as traffic between VMs can be restricted and monitored.
upvoted 2 times
...
gjimenezf
1 year ago
Selected Answer: C
Traffic filtering is a VM configuration, Data segmentation is not
upvoted 1 times
...
maawar83
1 year, 1 month ago
answer is D. think Defense in Depth... A. Data Segmentation will still require firewall for filtering. B. Data Encryption is the best option but it is not a network configuration C. Traffic Filtering.. provide security filtering.. but if you think defense in Depth.. Traffic throttling. Traffic Throttling: Description: Control or limit the rate of data transfer or the number of requests between devices or applications to prevent resource abuse and manage bandwidth usage. Implementation: Implement Quality of Service (QoS) policies to prioritize critical applications. Use rate limiting or traffic shaping mechanisms to prevent DDoS attacks and control the flow of traffic.
upvoted 1 times
...
InclusiveSTEAM
1 year, 4 months ago
Selected Answer A The best virtual network configuration option to protect virtual machines (VMs) is A - data segmentation. Data segmentation involves separating VMs into different virtual networks based on factors like function, data sensitivity, and access requirements. This helps isolate critical assets, enforce restrictions between VM groups, and limit lateral movement in the event an attacker gains access. Data encryption (B) protects data confidentiality but does not stop attacks or restrict access between VMs. Traffic filtering (C) controls allowed protocols/ports but permits all traffic within the same network. Traffic throttling (D) reduces network DoS impact but does not truly protect VMs from being compromised.
upvoted 1 times
...
Voxycs
1 year, 4 months ago
Selected Answer: C
C. Traffic filtering Traffic filtering in a virtual network environment ensures that only authorized traffic reaches the virtual machines, while unauthorized or potentially malicious traffic is blocked or discarded. This helps in protecting the VMs from various network-based attacks and unauthorized access. While data segmentation, data encryption, and traffic throttling have their own security and performance merits, traffic filtering directly acts as a protective measure for VMs against unwanted network traffic.
upvoted 1 times
...
Dam0s
1 year, 4 months ago
Selected Answer: C
As BP lopbster said "Data segmentation is not the same as network segmentation", therefore the answer is C: Traffic filtering
upvoted 1 times
...
BoyBastos
1 year, 5 months ago
Selected Answer: C
The best virtual network configuration option to protect virtual machines (VMs) is C. Traffic filtering. Traffic filtering is the process of controlling the flow of traffic between different networks or hosts. It can be used to block malicious traffic, prevent unauthorized access to VMs, and protect sensitive data.
upvoted 1 times
...
Rama2023
1 year, 9 months ago
The best virtual network configuration option to protect virtual machines (VM) is traffic filtering. Traffic filtering controls the inbound and outbound network traffic to and from the virtual machines based on predefined rules. By doing so, it can prevent unauthorized access to the virtual machines and protect them from malicious attacks.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago