SY0-501 - Chapter 1 Mastering Security Basics
Take a snapshot of the VM before deploying the new application.
Take a snapshot of the VM after deploying the new application.
Ensure the server is configured for non-persistence.
Back up the server after installing the new application.
Snapshots
Cable locks
Strong passwords
Persistent VDI
Use hashes.
Encrypt it before sending.
Protect it with a digital signature.
Use RAID.
Supporting confidentiality
Supporting availability
Supporting obfuscation
Supporting non-repudiation
Supporting confidentiality
Supporting integrity
Supporting encryption
Supporting availability
To support steganography
To support integrity
To support availability
To support obfuscation
Most physical servers within the organization are currently utilized at close to 100 percent.
The organization has many servers that do not require failover services.
Most desktop PCs require fast processors and a high amount of memory.
Most physical servers within the organization are currently underutilized.
Ensure critical systems provide uninterrupted service.
Protect data-in-transit from unauthorized disclosure.
Ensure systems are not susceptible to unauthorized changes.
Secure data to prevent unauthorized disclosure.
Ifconfig
Ipconfig
Netstat
Tracert
VM escape
VDI snapshot
VM sprawl
Type II hypervisor
Arp
Ipconfig
Netstat
Ping
Arp
Ipconfig
Ping
Netstat
Container virtualization
Type I hypervisor virtualization
Type II hypervisor virtualization
VDE
VDE
Snapshots for non-persistence
Type I hypervisors
VM sprawl
Container virtualization
VM escape
Non-persistence
Elasticity
Wait!
Here's an interesting quiz for you.