What should be included in the design to support this requirement?

You are designing consumer compute resources in an onsite private cloud. During an assessment, you discover that the organization’s IT staff wants secure access to the underlying host OS.

What should be included in the design to support this requirement?
A . Host IDS configuration
Secure key infrastructure
Bridged management network
B . Perimeter firewall configuration
VPN encryption
Separate management network

C . Host OS firewall configuration
Central logging
Physically isolated management network
D . Host OS firewall configuration
Secure key infrastructure
Separate management network

Answer: B

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments