141k views
4 votes
A recent overview of the network's security and storage applications reveals a large amount of data that needs to be isolated for security reasons. Below are the critical applications and devices configured on the network:

Firewall
Core switches
RM server
Virtual environment
NAC solution

The security manager also wants data from all critical applications to be aggregated to correlate events from multiple sources. Which of the following must be configured in certain applications to help ensure data aggregation and data isolation are implemented on the critical applications and devices?

A. Routing tables
B. Log forwarding
C. Data remanants
D. Port aggregation
E. NIC teaming
F. Zones

1 Answer

5 votes

Final answer:

To ensure data aggregation and isolation on critical network applications, log forwarding and zones must be configured. Log forwarding allows centralized analysis of security events, while zones help to create secure segments to isolate sensitive data.

Step-by-step explanation:

To ensure that data aggregation and data isolation are implemented effectively on the critical applications and devices in a network, certain configurations must be applied. Data aggregation involves collecting and summarizing data from various sources for analysis, while data isolation is about ensuring that data is partitioned or segmented for security reasons.

The two configurations from the provided list that would be most useful for these tasks are:

The use of zones would involve creating secure segments within the network for the RM server and other critical infrastructure. In these zones, access controls would be enforced to prevent unauthorized data access. Log forwarding would complement this by enabling security personnel to monitor and analyze security events from all zones comprehensively.

User Charina
by
7.5k points