An organization is seeking to improve its security posture in a virtualized environment. Which of the following actions BEST ensures the isolation of sensitive applications from other less critical applications?
Creating separate virtual machines for each sensitive application
Deploying a virtual firewall to manage traffic between virtual machines
Implementing a host-based firewall on the virtual machine hosting the sensitive applications
Segmenting the virtual network within the virtual machine
|Incident Response and Management
|Reporting and Communication