Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 382 discussion

Actual exam question from ISC's CISSP
Question #: 382
Topic #: 1
[All CISSP Questions]

Which of the following virtual network configuration options is BEST to protect virtual machines (VM)?

  • A. Data segmentation
  • B. Data encryption
  • C. Traffic filtering
  • D. Traffic throttling
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Nabs1
Highly Voted 2 years, 2 months ago
Selected Answer: A
Data segmentation seems more appropriate. I am loosing confidence in the correctness of the answers. If the answers ARE incorrect then it is damaging for everyone who are trying to learn here
upvoted 22 times
Jamati
2 years ago
Why do you even look at the answer? Just go straight to the discussion.
upvoted 8 times
...
jackdryan
1 year, 6 months ago
C is correct
upvoted 1 times
...
...
BP_lobster
Highly Voted 1 year, 11 months ago
Selected Answer: C
Of the given answers only Traffic filtering is a valid Virtual Network Configuration for VM Protection. A. Data segmentation - not the same as network segmentation B. Data encryption - not a virtual network configuration C. Traffic filtering - is a virtual network configuration (e.g. via a firewall) D. Traffic throttling - better than A and B but C is best. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-125B.pdf VM Protection through Traffic Control Using Firewalls: "The primary use of a firewall is for traffic control. In a virtualized infrastructure, traffic control for VM protection is to be exercised for the following two scenarios: • Traffic flowing between any two virtual network segments (or subnets) • All traffic flowing into and out of a VM" Big thanks to Jay327 and CuteRabbit168 for their answers. Helped me out!
upvoted 19 times
...
KJ44
Most Recent 2 weeks, 3 days ago
Selected Answer: A
To best protect virtual machines (VMs), the most effective virtual network configuration option is network segmentation, which involves dividing the virtual network into separate subnets to isolate traffic and restrict communication between different VM groups, significantly enhancing security by limiting potential attack vectors.
upvoted 1 times
...
Robin96
1 month, 4 weeks ago
Selected Answer: C
C is correct
upvoted 1 times
...
deeden
3 months, 1 week ago
Selected Answer: A
C. This is crucial for controlling and monitoring network traffic, but it primarily addresses network-level threats and does not prevent or mitigate hypervisor-related attacks or VM-to-VM threats. A. This can prevent VMs from interacting with each other in unauthorized ways and reduce the risk of attacks like VM Escape, where a malicious VM could potentially access other VMs or the hypervisor. Segmentation also supports defense in depth by limiting the scope of an attack (attack surface), ensuring that if one segment is compromised, the attacker cannot easily move laterally to other segments.
upvoted 1 times
...
1460168
3 months, 3 weeks ago
Selected Answer: C
I vote for C, because data segmentation contains network segmentation, but this would us not help. We need to filter with a firewall.
upvoted 1 times
...
pete79
9 months, 2 weeks ago
Selected Answer: C
Network works with the traffic, throttling does solve nothing, but filtering can pass or block traffic.
upvoted 2 times
...
GuardianAngel
9 months, 2 weeks ago
Answer: traffic filtering 1. Access Control: Traffic filtering allows organizations to define specific rules that determine which types of traffic are allowed or blocked. For example, they can create rules to only allow traffic from trusted sources or specific IP addresses, while blocking traffic from potentially malicious sources. This helps prevent unauthorized access to the VMs. 2. Protection against Attacks: By implementing traffic filtering, organizations can block or restrict traffic associated with known attack vectors, such as denial-of-service (DoS) attacks, port scanning, or malware communication. This helps mitigate the risk of VMs being targeted and compromised by malicious activities. 3. Segmentation and Isolation: Traffic filtering enables organizations to segregate and isolate different VMs or groups of VMs within the virtual network. This helps contain any potential security breaches or incidents, as traffic between VMs can be restricted and monitored.
upvoted 2 times
...
gjimenezf
9 months, 3 weeks ago
Selected Answer: C
Traffic filtering is a VM configuration, Data segmentation is not
upvoted 1 times
...
maawar83
10 months, 3 weeks ago
answer is D. think Defense in Depth... A. Data Segmentation will still require firewall for filtering. B. Data Encryption is the best option but it is not a network configuration C. Traffic Filtering.. provide security filtering.. but if you think defense in Depth.. Traffic throttling. Traffic Throttling: Description: Control or limit the rate of data transfer or the number of requests between devices or applications to prevent resource abuse and manage bandwidth usage. Implementation: Implement Quality of Service (QoS) policies to prioritize critical applications. Use rate limiting or traffic shaping mechanisms to prevent DDoS attacks and control the flow of traffic.
upvoted 1 times
...
InclusiveSTEAM
1 year, 1 month ago
Selected Answer A The best virtual network configuration option to protect virtual machines (VMs) is A - data segmentation. Data segmentation involves separating VMs into different virtual networks based on factors like function, data sensitivity, and access requirements. This helps isolate critical assets, enforce restrictions between VM groups, and limit lateral movement in the event an attacker gains access. Data encryption (B) protects data confidentiality but does not stop attacks or restrict access between VMs. Traffic filtering (C) controls allowed protocols/ports but permits all traffic within the same network. Traffic throttling (D) reduces network DoS impact but does not truly protect VMs from being compromised.
upvoted 1 times
...
Voxycs
1 year, 1 month ago
Selected Answer: C
C. Traffic filtering Traffic filtering in a virtual network environment ensures that only authorized traffic reaches the virtual machines, while unauthorized or potentially malicious traffic is blocked or discarded. This helps in protecting the VMs from various network-based attacks and unauthorized access. While data segmentation, data encryption, and traffic throttling have their own security and performance merits, traffic filtering directly acts as a protective measure for VMs against unwanted network traffic.
upvoted 1 times
...
Dam0s
1 year, 1 month ago
Selected Answer: C
As BP lopbster said "Data segmentation is not the same as network segmentation", therefore the answer is C: Traffic filtering
upvoted 1 times
...
BoyBastos
1 year, 2 months ago
Selected Answer: C
The best virtual network configuration option to protect virtual machines (VMs) is C. Traffic filtering. Traffic filtering is the process of controlling the flow of traffic between different networks or hosts. It can be used to block malicious traffic, prevent unauthorized access to VMs, and protect sensitive data.
upvoted 1 times
...
Rama2023
1 year, 6 months ago
The best virtual network configuration option to protect virtual machines (VM) is traffic filtering. Traffic filtering controls the inbound and outbound network traffic to and from the virtual machines based on predefined rules. By doing so, it can prevent unauthorized access to the virtual machines and protect them from malicious attacks.
upvoted 1 times
...
DASH_v
1 year, 6 months ago
c. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-125B.pdf The common requirement in all the use cases discussed above is that all inter-VM traffic must be subjected to policy-based inspection and filtering
upvoted 2 times
...
Delab202
1 year, 7 months ago
Selected Answer: C
Traffic filtering is the process of selectively allowing or blocking network traffic based on predefined criteria. This is typically done using a firewall or other network security device. The purpose of traffic filtering is to protect network resources and prevent unauthorized access to sensitive data. By selectively allowing or blocking traffic based on predefined rules, traffic filtering can help prevent malware, viruses, and other types of attacks from entering a network.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...