
Answer-first summary for fast verification
Answer: Implement a comprehensive security strategy that includes secure access controls, encryption for data at rest and in transit, regular security audits, and continuous monitoring and logging to detect and respond to threats in real-time.
A comprehensive security strategy for a VDI environment must address multiple layers of security, including the virtual desktops, the underlying infrastructure, and data in transit and at rest. Secure access controls ensure that only authorized users can access the VDI, encryption protects sensitive data from unauthorized access, and continuous monitoring and logging enable the detection and response to security incidents in real-time. Option A is incorrect because it overlooks the importance of securing the underlying infrastructure and network communications. Option B is incorrect because default security features may not suffice to meet all compliance and security requirements. Option D is incorrect because it compromises security for the sake of simplicity and cost, potentially exposing the organization to data breaches and compliance violations.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
Your organization is planning to implement a new virtual desktop infrastructure (VDI) to support remote work for employees across various departments. As a cybersecurity architect, you are tasked with specifying the security requirements for the VDI environment. The solution must comply with industry standards, ensure data protection, and support scalability for future growth. Considering these requirements, which of the following measures should you prioritize to ensure the security of the VDI environment? (Choose one correct option)
A
Focus exclusively on endpoint security for the virtual desktops, neglecting the security of the underlying infrastructure and network communications.
B
Rely solely on the default security features provided by the VDI platform, without conducting any additional security assessments or implementations.
C
Implement a comprehensive security strategy that includes secure access controls, encryption for data at rest and in transit, regular security audits, and continuous monitoring and logging to detect and respond to threats in real-time.
D
Limit the VDI access to a predefined list of applications and users, ignoring the need for encryption, access controls, or monitoring to reduce complexity and costs.
No comments yet.