ExamGecko
Question list
Search
Search

Related questions

Question 69 - CISA discussion

Report
Export

Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?

A.
Monitor access to stored images and snapshots of virtual machines.
Answers
A.
Monitor access to stored images and snapshots of virtual machines.
B.
Restrict access to images and snapshots of virtual machines.
Answers
B.
Restrict access to images and snapshots of virtual machines.
C.
Limit creation of virtual machine images and snapshots.
Answers
C.
Limit creation of virtual machine images and snapshots.
D.
Review logical access controls on virtual machines regularly.
Answers
D.
Review logical access controls on virtual machines regularly.
Suggested answer: A

Explanation:

The most effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines is to monitor access to stored images and snapshots of virtual machines. Images and snapshots are copies of virtual machines that can be used for backup, restoration, or cloning purposes. If data stored on virtual machines are unencrypted, they may be exposed or compromised if unauthorized or malicious users access or copy the images or snapshots. Therefore, monitoring access to stored images and snapshots can help detect and prevent any unauthorized or suspicious activities, and provide audit trails for accountability and investigation.

Restricting access to images and snapshots of virtual machines, limiting creation of virtual machine images and snapshots, and reviewing logical access controls on virtual machines regularly are not the most effective controls for protecting the confidentiality and integrity of data stored unencrypted on virtual machines. These controls may help reduce the risk or impact of data exposure or compromise, but they do not provide sufficient visibility or assurance of data protection. Restricting access to images and snapshots may not prevent authorized users from abusing their privileges or credentials. Limiting creation of virtual machine images and snapshots may not address the existing copies that may contain sensitive data. Reviewing logical access controls on virtual machines regularly may not reflect the actual access activities on images and snapshots.

asked 18/09/2024
giancarlo bagnetti srl
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first