A recent overview of the network's security and storage applications reveals a large amount of data that needs to be isolated for security reasons.
Below are the critical applications and devices configured on the network: -> Firewall -> Core switches -> RM server -> Virtual environment -> NAC solution The security manager also wants data from all critical applications to be aggregated to correlate events from multiple sources.
Which of the following must be configured in certain applications to help ensure data aggregation and data isolation are implemented on the critical applications and devices? (Choose two.)
Click on the arrows to vote for the correct answer
A. B. C. D. E. F.BF.
The security manager wants to ensure that data aggregation and data isolation are implemented for critical applications and devices in the network. To achieve this goal, two of the following options must be configured:
B. Log Forwarding: Log forwarding is the process of forwarding log data from one location to another. This configuration allows the security manager to collect logs from multiple sources, including the firewall, core switches, RM server, virtual environment, and NAC solution, and store them in a centralized location for analysis. By aggregating logs from multiple sources, the security manager can correlate events and identify potential security threats. Additionally, storing logs in a centralized location provides better data protection and storage management.
F. Zones: Zones are a network segmentation technique that separates network resources into different zones based on their security requirements. For example, the security manager can create a zone for critical applications and devices and isolate it from other zones to prevent unauthorized access. By configuring zones, the security manager can ensure that data isolation is implemented for critical applications and devices in the network. Additionally, zones can help improve network performance and reduce the risk of security breaches.
A. Routing Tables: Routing tables are used to determine the path that data takes through a network. While routing tables are important for network performance, they do not help ensure data aggregation or data isolation for critical applications.
C. Data Remnants: Data remnants are residual data that remains on storage devices after they have been deleted. While data remnants can pose a security risk, they do not help ensure data aggregation or data isolation for critical applications.
D. Port Aggregation: Port aggregation is a technique used to combine multiple network ports into a single logical port. While port aggregation can improve network performance, it does not help ensure data aggregation or data isolation for critical applications.
E. NIC Teaming: NIC teaming is a technique used to combine multiple network interface cards (NICs) into a single logical interface. While NIC teaming can improve network performance, it does not help ensure data aggregation or data isolation for critical applications.
In summary, to ensure data aggregation and data isolation for critical applications and devices in the network, log forwarding and zones must be configured.