A new database application was added to a company’s hosted VM environment. Firewall ACLs were modified to allow database users to access the server remotely. The company’s cloud security broker then identified abnormal from a database user on-site. Upon further investigation, the security team noticed the user ran code on a VM that provided access to the hypervisor directly and access to other sensitive data.
Which of the following should the security team do to help mitigate future attacks within the VM environment? (Choose two.)
A . Install the appropriate patches.
B . Install perimeter NGF
D . Configure VM isolation.
E . Deprovision database V
G . Change the user’s access privileges.
H . Update virus definitions on all endpoints.
Answer: AB
Leave a Reply