1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VikaD [51]
1 year ago
11

over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. you need a way to track w

ho made these changes and when. what should you do?
Computers and Technology
1 answer:
Nuetrik [128]1 year ago
7 0

One way to track who made these changes to the virtual machine cloud settings and when is to: D. enable cloud resource activity auditing.

<h3>What is a cloud?</h3>

In Computer technology, a cloud can be defined as the elastic leasing of pooled computer resources such as physical hardware through virtualization and over the Internet, so as to enable the storage and sharing of files and documents virtually and in real-time.

In this scenario, we can reasonably infer and logically conclude that one way to track who made these changes to the virtual machine cloud settings and when is to enable cloud resource activity auditing because it would provide a log of actions such as information about the engineer who made configuration changes.

Read more on a virtual machine here: brainly.com/question/12060797

#SPJ1

Complete Question:

Over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. You need a way to track who made these changes and when. What should you do?

A. Enable virtual machine API integration.

B. Rotate the cloud access keys.

C. Deploy an OSI layer 7 firewall.

D. Enable cloud resource activity auditing.

You might be interested in
Question 2: Did every packet arrive in the correct order? Describe what went wrong and whether your partner was able to read the
Gemiola [76]

Answer:

No, the packets did not arrive in the right order but the TCP protocol reordered the packets. The transmission took a while, but the message was finally delivered.

Explanation:

Packets are chunks of data from a data source or message transmitted from one computer device to another. Protocols like TCP or transmission control protocol and UDP (user datagram protocol) are used for data transfer, with TCP as the more reliable protocol (it checks for errors, retransmit lost packets, and reorders received packets in the destination device) and slow protocol.

5 0
4 years ago
Write an algorithm in pseudocode or english that would describe how to use a stack to reverse any list.
s2008m [1.1K]
Int data[n];
int rev[n];

for (i=0; i < n; i++)
     stack.push(data[n]);
for (i=0; i <n; i++)
     rev[i] = stack.pop();

3 0
3 years ago
When a single physical computer runs this type of software, it operates as though it were two or more separate and independent c
Alecsey [184]

Answer:

virtualization

Explanation:

When a single physical computer runs the special type of software known as the virtualization software it allows the single physical computer to run multiple distinct operating system, making it look as though there were two or more independent and separate computers and working in an isolated fashion simultaneously.

5 0
4 years ago
Role of User Defined Iprms for creation of paten
Mazyrski [523]

Answer:

3

Explanation:

3 0
3 years ago
How can having good organization skills help you be a better students/employee?
abruzzese [7]

Answer:

Help you be a better student:

1. its easier to find things to help you study

2. it's easier to turn assignments in

help you be a better employee

1. organization skills can help you get a job

2. they can help you while your working the job

3. they can help others who are working the same job\ are trying to buy something from your job (some kind of store example: grocery store, clothing store, furniture store etc.)

8 0
3 years ago
Other questions:
  • 11What is the definition of bandwidth? the speed at which bits travel on the network the measure of the transfer of bits across
    7·1 answer
  • What word does<br> this pattern spell?<br> d.
    7·1 answer
  • If a suspect is not read his or her Miranda rights, then nothing the suspect says can be used at trial, even if the suspect volu
    11·1 answer
  • If a user wished to insert a triangle or a callout figure in a document, he or she should select the _____ option.
    8·1 answer
  • I need help with this!!! PLEASE!!! Are headphones, radios, dishwashers, and remote controls considered Computers? Do any of them
    10·2 answers
  • Which statement best describes an advantage of using the Subtotal dialog box?
    14·1 answer
  • Which part of project management considers if employees will work at home or in the office?
    10·2 answers
  • Use your editor to open the cc_data.js file and study the data stored in the staff object to become familiar with its contents a
    6·1 answer
  • What are some limitations when it comes to testing and ensuring program quality? List at
    15·1 answer
  • The implementation stage of the SDLC is when the system is moved into operation where it can be used. What stage PRECEDES the im
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!