What approach should an organization take to secure its network infrastructure while maintaining high service availability?

Disable ads (and more) with a membership for a one time $4.99 payment

Prepare for the Certmaster CE Security+ Domain 3.0 exam. Utilize flashcards and multiple-choice questions, each with hints and explanations, to get ready for your test!

The most effective approach for securing a network infrastructure while maintaining high service availability is to distribute servers across different secure locations and disable unused ports. This method enhances both security and redundancy.

By distributing servers, an organization can reduce the risk of a single point of failure; if one location becomes compromised or experiences downtime, other servers in different locations can continue to provide services. This geographic diversification can also help in mitigating threats such as natural disasters, power outages, or regional cyber-attacks.

Additionally, disabling unused ports increases the security posture by minimizing the attack surface. Unused ports can be potential entry points for unauthorized access, so ensuring that they are disabled protects the network from vulnerabilities associated with those ports.

This strategy balances the need for robust security measures with the ongoing demand for availability and reliability in service delivery. It helps create a resilient network architecture that can withstand various types of threats.

Other choices do not effectively combine security and availability principles. Limiting the number of connections to a server could hinder performance and accessibility for legitimate users. Centralizing all servers in one location poses significant risks by creating a single point of failure that could impact the entire organization's operations. Installing multiple firewalls can enhance security, but without careful configuration and management, it does not guarantee high service