
Answer-first summary for fast verification
Answer: Conduct a thorough assessment to identify the specific security requirements and vulnerabilities for each server based on its platform, operating system, and the sensitivity of the data it will handle, then implement tailored security measures accordingly.
The correct approach involves a detailed assessment of each server's specific needs based on its platform, operating system, and the nature of the data it will process. This ensures that security measures are both effective and efficient, addressing the unique vulnerabilities and compliance requirements of each system. Option A overlooks the nuanced security needs of different platforms, potentially leaving some servers under-protected. Option C fails to account for the full spectrum of threats, especially those targeting less common platforms. Option D neglects the necessity of customizing security settings beyond defaults to meet organizational and regulatory standards, leaving systems vulnerable to attacks that exploit default configurations.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
Your organization is planning to deploy a new server infrastructure that includes multiple platforms and operating systems, aiming to host critical applications that process sensitive customer data. As a cybersecurity architect, you are tasked with specifying the security requirements for these servers to ensure compliance with industry standards and protect against evolving threats. Considering the diversity of platforms and operating systems, cost-effectiveness, and the need for scalability, which of the following approaches should you take to ensure the security of these servers? (Choose one)
A
Implement a uniform security policy across all servers to simplify management and reduce costs, assuming that the highest common security standards will suffice for all platforms.
B
Conduct a thorough assessment to identify the specific security requirements and vulnerabilities for each server based on its platform, operating system, and the sensitivity of the data it will handle, then implement tailored security measures accordingly.
C
Focus primarily on protecting against the most prevalent threats identified in the latest cybersecurity reports, applying these protections uniformly across all servers to ensure baseline security.
D
Deploy all servers with their default security configurations to expedite the deployment process, relying on the inherent security features of each operating system without additional customization.
No comments yet.