Multiple Choice
A new database application was added to a company's hosted VM environment. Firewall ACLs were modified to allow database users to access the server remotely. The company's cloud security broker then identified abnormal from a database user on-site. Upon further investigation, the security team noticed the user ran code on a VM that provided access to the hypervisor directly and access to other sensitive data. Which of the following should the security team do to help mitigate future attacks within the VM environment? (Choose two.)
A) Install the appropriate patches.
B) Install perimeter NGFW.
C) Configure VM isolation.
D) Deprovision database VM.
E) Change the user's access privileges.
F) Update virus definitions on all endpoints.
Correct Answer:

Verified
Correct Answer:
Verified
Q344: A security administrator is concerned about the
Q345: A large, public university has recently been
Q346: The government is concerned with remote military
Q347: Company leadership believes employees are experiencing an
Q348: While investigating suspicious activity on a server,
Q350: A security administrator adding a NAC requirement
Q351: A security administrator is troubleshooting RADIUS authentication
Q352: An incident responder wants to capture volatile
Q353: A hospital is using a functional magnetic
Q354: Several days after deploying an MDM for