Which of the following security risks can result from the configuration in this scenario?

A company has a legacy virtual cluster which was added to the datacenter after a small company
was acquired. All VMs on the cluster use the same virtual network interface to connect to the

corporate data center LAN. Some of the virtual machines on the cluster process customer data,
some process company financial data, and others act as externally facing web servers. Which of
the following security risks can result from the configuration in this scenario?

A company has a legacy virtual cluster which was added to the datacenter after a small company
was acquired. All VMs on the cluster use the same virtual network interface to connect to the

corporate data center LAN. Some of the virtual machines on the cluster process customer data,
some process company financial data, and others act as externally facing web servers. Which of
the following security risks can result from the configuration in this scenario?

A.
Visibility on the traffic between the virtual machines can impact confidentiality

B.
NIC utilization can exceed 50 percent and impact availability

C.
Shared virtual switches can negatively impact the integrity of network packets

D.
Additional overhead from network bridging can affect availability



Leave a Reply 0

Your email address will not be published. Required fields are marked *