1.Following a review of security requirements, an architect has confirmed the following requirements:
- REQ001- A clustered firewall solution must be placed at the perimeter of the hosting platform, and all ingress and egress network traffic will route via this device.
- REQ002- A distributed firewall solution must secure traffic for all virtualized workloads.
- REQ003- All virtualized workload, hypervisor, firewall and any management component system events must be monitored by security administrators.
- REQ004- The hosting platforms security information and event management (SIEM) system must be scalable to 20,000 events per second.
- REQ005- The hosting platforms storage must be configured with data-at-rest encryption.
- REQ006- The hosting platform limits access to authorized users.
Which three requirements would be classified as technical (formerly non-functional) requirements? (Choose three.)
A. A clustered firewall solution must be placed at the perimeter of the hosting platform, and all ingress and egress network traffic will route via this device.
B. A distributed firewall solution must secure traffic for all virtualized workloads.
C. The hosting platforms security information and event management (SIEM) system must be scalable to 20,000 events per second.
D. The hosting platforms storage must be configured with data-at-rest encryption.
E. The hosting platform limits access to authorized users.
F. All virtualized workload, hypervisor, firewall and any management component system events must be monitored by security administrators.
Explanation:
A clustered firewall solution must be placed at the perimeter of the hosting platform, and all ingress and egress network traffic will route via this device:
This is a technical requirement because it specifies how network traffic is to be managed through a specific infrastructure element (the firewall). It outlines how the security device is implemented in the network architecture.
The hosting platform's security information and event management (SIEM) system must be scalable to 20,000 events per second:
This is a technical requirement because it deals with the scalability and performance of the SIEM system. It specifies how the system must handle a large volume of data, which is a technical characteristic of the infrastructure.
The hosting platform's storage must be configured with data-at-rest encryption:
This is also a technical requirement because it defines how the data should be stored securely, which is an implementation detail. It specifies that encryption needs to be applied to stored data, a feature related to storage infrastructure.