A security administrator has finished building a Linux server which will host multiple virtual
machines through hypervisor technology. Management of the Linux server, including monitoring
server performance, is achieved through a third party web enabled application installed on the
Linux server. The security administrator is concerned about vulnerabilities in the web application
that may allow an attacker to retrieve data from the virtual machines.
Which of the following will BEST protect the data on the virtual machines from an attack?
A.
The security administrator must install the third party web enabled application in a chroot
environment.
B.
The security administrator must install a software firewall on both the Linux server and the
virtual machines.
C.
The security administrator must install anti-virus software on both the Linux server and the
virtual machines.
D.
The security administrator must install the data exfiltration detection software on the perimeter
firewall.