EMC Dell Information Storage and Management Foundations 2023 Exam D-ISM-FN-23 Question # 54 Topic 6 Discussion
D-ISM-FN-23 Exam Topic 6 Question 54 Discussion:
Question #: 54
Topic #: 6
How should vulnerabilities be managed in a data center environment? (Verify the Correct answer from Associate - Information Storage and Management Study Manual from dellemc.com)
A.
Minimize the attack surfaces and maximize the work factors
B.
Minimize the attack surfaces and minimize the work factors
C.
Maximize the attack surfaces and minimize the attack vector
D.
Maximize the attack surfaces and maximize the attack vector
According to 1, vulnerabilities are weaknesses that can be exploited by attackers to compromise the confidentiality, integrity, or availability of data or systems. Vulnerabilities can exist at various levels of a data center environment, such as applications, operating systems, networks, devices, and physical infrastructure.
One of the ways to manage vulnerabilities in a data center environment is to minimize the attack surfaces and maximize the work factors1. This means that you should reduce the number of entry points and exposure areas that an attacker can exploit (attack surfaces) and increase the amount of effort and resources that an attacker needs to overcome your defenses (work factors). This can be achieved by applying various security measures such as patching, hardening, encryption, authentication, authorization, monitoring, auditing, and testing.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit