How should vulnerabilities be managed in a data center environment? (Verify the Correct answer from Associate – Information Storage and Management Study Manual from dellemc.com)

How should vulnerabilities be managed in a data center environment? (Verify the Correct answer from Associate – Information Storage and Management Study Manual from dellemc.com)
A . Minimize the attack surfaces and maximize the work factors
B. Minimize the attack surfaces and minimize the work factors
C. Maximize the attack surfaces and minimize the attack vector
D. Maximize the attack surfaces and maximize the attack vector

Answer: A

Explanation:

According to 1, vulnerabilities are weaknesses that can be exploited by attackers to compromise the confidentiality, integrity, or availability of data or systems. Vulnerabilities can exist at various levels of a data center environment, such as applications, operating systems, networks, devices, and physical infrastructure.

One of the ways to manage vulnerabilities in a data center environment is to minimize the attack surfaces and maximize the work factors1. This means that you should reduce the number of entry points and exposure areas that an attacker can exploit (attack surfaces) and increase the amount of effort and resources that an attacker needs to overcome your defenses (work factors). This can be achieved by applying various security measures such as patching, hardening, encryption, authentication, authorization, monitoring, auditing, and testing.

Latest DEA-1TT5 Dumps Valid Version with 122 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments