Your group is deploying a data analytics system that processes medical records in a shared environment. The architects want to ensure stored content does not reach external networks. Which measure best addresses this requirement?
Place an inspection sensor that monitors and inspects incoming data flows at the gateway
Use separate zones with defined interface rules to limit connections to the internal system
Set up clearly defined roles granting staff remote privileges for a controlled login
Perform authenticated scanning on the system to detect any exposures
Segregating the platform behind separate zones with defined interface rules limits external connections, preventing unauthorized traffic from reaching the resource. A sensor deployed at the gateway can help detect threats, but it does not isolate a platform from outside connections. Authenticated scanning assists in identifying security weaknesses but does not control inbound or outbound traffic. Setting up roles with remote privileges may inadvertently expand access points.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of using separate zones with defined interface rules in a network?
Open an interactive chat with Bash
How does a network inspection sensor differ from isolating a platform using zones?
Open an interactive chat with Bash
Why is authenticated scanning insufficient for preventing unauthorized access to sensitive systems?