PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following security risks can result from the configuration in this scenario?

A company has a legacy virtual cluster which was added to the datacenter after a small company
was acquired. All VMs on the cluster use the same virtual network interface to connect to the

corporate data center LAN. Some of the virtual machines on the cluster process customer data,
some process company financial data, and others act as externally facing web servers. Which of
the following security risks can result from the configuration in this scenario?

Which of the following is the MOST likely explanation for this behavior?

A user on a virtual machine downloads a large file using a popular peer-to-peer torrent program.
The user is unable to execute the program on their VM. A security administrator scans the VM and
detects a virus in the program. The administrator reviews the hypervisor logs and correlates
several access attempts to the time of execution of the virus. Which of the following is the MOST
likely explanation for this behavior?