
Answer-first summary for fast verification
Answer: Define comprehensive security requirements that include secure communication channels, rigorous access control policies, and uniform security measures across both on-premises and cloud environments.
The BEST approach is to define comprehensive security requirements that encompass secure communication, access control, and consistent security policies across both on-premises and cloud environments. This ensures a unified security posture that addresses the unique challenges of a hybrid cloud setup, complies with industry regulations, and supports scalability and cost-effectiveness. While Azure provides robust security features, relying solely on them without integrating on-premises security measures can leave gaps in the overall security framework. Similarly, focusing only on network and endpoint security or implementing isolated security measures without integration does not provide a holistic solution to the hybrid cloud's security challenges.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
Your company is transitioning to a hybrid cloud environment, integrating both on-premises and Microsoft Azure cloud-based resources. As the Cybersecurity Architect, you are tasked with ensuring the security of this environment. The solution must comply with industry regulations, support scalability, and maintain cost-effectiveness. Considering these constraints, which of the following approaches BEST ensures the security of the hybrid cloud environment? (Choose one option.)
A
Implement strong authentication mechanisms and data encryption for both on-premises and cloud-based resources, without considering the integration between them.
B
Define comprehensive security requirements that include secure communication channels, rigorous access control policies, and uniform security measures across both on-premises and cloud environments.
C
Focus exclusively on securing the network infrastructure and endpoints that facilitate access to the hybrid cloud environment, neglecting internal data protection measures.
D
Depend solely on Microsoft Azure's built-in security features for the cloud components and assume on-premises resources are inherently secure.
No comments yet.