SY0-501 - Chapter 1 Mastering Security Basics
Take a snapshot of the VM before deploying the new application.
Take a snapshot of the VM after deploying the new application.
Ensure the server is configured for non-persistence.
Back up the server after installing the new application.
Encrypt it before sending.
Protect it with a digital signature.
To support steganography
To support integrity
To support availability
To support obfuscation
Most physical servers within the organization are currently utilized at close to 100 percent.
The organization has many servers that do not require failover services.
Most desktop PCs require fast processors and a high amount of memory.
Most physical servers within the organization are currently underutilized.
Ensure critical systems provide uninterrupted service.
Protect data-in-transit from unauthorized disclosure.
Ensure systems are not susceptible to unauthorized changes.
Secure data to prevent unauthorized disclosure.
Type II hypervisor
Type I hypervisor virtualization
Type II hypervisor virtualization
Snapshots for non-persistence
Type I hypervisors
Here's an interesting quiz for you.