An active/passive configuration has an impact on:
Click on the arrows to vote for the correct answer
A. B. C. D.C.
An active/passive configuration is a type of high-availability setup where two identical systems are deployed and only one is active at a time, while the other is on standby or passive mode, ready to take over in case the active system fails. This configuration impacts the availability of the system and not the other security objectives such as confidentiality, integrity, and non-repudiation.
Availability is a security objective that ensures that systems and resources are accessible to authorized users when needed. Active/passive configuration helps to increase availability by ensuring that the system remains available even in the event of a failure of one of the systems. In this configuration, the passive system monitors the active system for any failures and takes over in the event of a failure. This ensures that the system is always available to authorized users, which is critical for business continuity.
Confidentiality, on the other hand, refers to the protection of sensitive information from unauthorized access. Active/passive configuration does not directly impact confidentiality as it does not affect the access control mechanisms in place to protect sensitive information.
Integrity is the assurance that data remains accurate, complete, and unaltered. Active/passive configuration does not impact integrity as it does not affect the mechanisms in place to ensure data integrity, such as checksums, digital signatures, or data validation.
Non-repudiation refers to the ability to prove the authenticity and integrity of a message or transaction. Active/passive configuration does not directly impact non-repudiation, as it does not affect the mechanisms in place to ensure non-repudiation, such as digital signatures or audit trails. However, in a high-availability setup, it is essential to ensure that both systems maintain consistent logs and audit trails to ensure that there is no repudiation of transactions.
In summary, the active/passive configuration has an impact on the availability of the system and not on confidentiality, integrity, and non-repudiation.