mediummultiple choiceObjective-mapped

A finance team deploys a regulated workload to a public cloud. They want operating system login events, process activity, and network flow metadata to be retained in one central place for detection and investigation. Which action best supports this requirement with the least operational overhead?

Question 1mediummultiple choice
Full question →

A finance team deploys a regulated workload to a public cloud. They want operating system login events, process activity, and network flow metadata to be retained in one central place for detection and investigation. Which action best supports this requirement with the least operational overhead?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

Rely on the cloud provider to automatically secure all guest operating systems and collect every log type by default.

The provider is not responsible for all guest OS logging in most shared-responsibility models. Customers usually still need to configure and retain the data they want.

B

Best answer

Enable cloud-native logging and forward guest telemetry from the workload into a centralized security logging service or SIEM.

This is the best approach because it uses cloud-native controls to capture logs close to the workload and centralizes them for correlation and retention. It supports visibility across identity, host, and network activity without building a separate logging stack from scratch. It also aligns with the shared responsibility model by keeping customer-controlled telemetry under the organization’s management.

C

Distractor review

Move the workload to a private data center so the cloud provider can no longer access any telemetry.

This changes the deployment model instead of solving the logging requirement. It is much more disruptive and does not inherently improve the logging architecture itself.

D

Distractor review

Disable host logging and rely only on perimeter firewall logs to reduce storage costs.

Firewall logs alone do not provide the host-level detail requested. Disabling host logging removes valuable evidence and weakens detection and investigations.

Common exam trap

Common exam trap: NAT rules depend on direction and matching traffic

NAT is not only about the public address. The inside/outside interface roles and the ACL or rule that matches traffic are just as important.

Technical deep dive

How to think about this question

NAT questions usually test address translation, overload/PAT behaviour, static mappings and whether the right traffic is being translated. Read the interface direction and address terms carefully.

KKey Concepts to Remember

  • Static NAT maps one inside address to one outside address.
  • PAT allows many inside hosts to share one public address using ports.
  • Inside local and inside global describe the private and translated addresses.
  • NAT ACLs identify traffic for translation, not always security filtering.

TExam Day Tips

  • Identify inside and outside interfaces first.
  • Check whether the scenario needs static NAT, dynamic NAT or PAT.
  • Do not confuse NAT matching ACLs with normal packet-filtering intent.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Static NAT maps one inside address to one outside address.

What is the correct answer to this question?

The correct answer is: Enable cloud-native logging and forward guest telemetry from the workload into a centralized security logging service or SIEM. — The most effective option is to use cloud-native logging and forward telemetry to a centralized security platform. This gives the organization visibility into host activity, identity events, and network flow data without building ad hoc logging on each system. It also supports retention, alerting, and incident response. In a cloud environment, that centralized visibility is essential because workloads may scale dynamically and move across different instances or zones. Why others are wrong: Option A assumes the provider will handle customer logging automatically, which is not realistic under shared responsibility. Option C is a heavy-handed migration rather than a logging solution. Option D cuts useful telemetry and would make investigations harder. The correct answer preserves visibility while staying operationally efficient and cloud-appropriate.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.