1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VikaD [51]
10 months ago
11

over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. you need a way to track w

ho made these changes and when. what should you do?
Computers and Technology
1 answer:
Nuetrik [128]10 months ago
7 0

One way to track who made these changes to the virtual machine cloud settings and when is to: D. enable cloud resource activity auditing.

<h3>What is a cloud?</h3>

In Computer technology, a cloud can be defined as the elastic leasing of pooled computer resources such as physical hardware through virtualization and over the Internet, so as to enable the storage and sharing of files and documents virtually and in real-time.

In this scenario, we can reasonably infer and logically conclude that one way to track who made these changes to the virtual machine cloud settings and when is to enable cloud resource activity auditing because it would provide a log of actions such as information about the engineer who made configuration changes.

Read more on a virtual machine here: brainly.com/question/12060797

#SPJ1

Complete Question:

Over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. You need a way to track who made these changes and when. What should you do?

A. Enable virtual machine API integration.

B. Rotate the cloud access keys.

C. Deploy an OSI layer 7 firewall.

D. Enable cloud resource activity auditing.

You might be interested in
Why are using some special characters (@, #, !, etc.) not a good idea?
konstantin123 [22]
There are pros and cons to using special characters in email subject lines. Generally, marketers report higher open rates.

Some report better engagement, but many don’t.

There are also reports of special characters causing problems with deliverability, mostly because spammers became very fond of special characters for a while.
5 0
3 years ago
Read 2 more answers
Question: Convert data into another form.
Anna11 [10]

Answer:

Data transformation is the process of changing the format, structure, or values of data.

Explanation:

6 0
3 years ago
Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other
quester [9]

Answer:

Option B is correct.

Explanation:

As such an application programmer, Shania recently began a new work. The first assignment was to create an earlier software available on certain devices, developed for Android.  

So, she using cross-platform software to compose application code that might convert the current android application code across various native versions to makes it much simpler and quicker for her job.

Other options are incorrect because they are not related to the following scenario.

4 0
3 years ago
__________ has remained a dominant communication tool, despite the rise in use of newer, alternative media options for message d
maksim [4K]

Answer: E-mails

Explanation:

 An E-mails is one of the type of digital message and also known as the dominant communication tool which is used for in the form of document in an organization where we can used it in different ways are as follows:

  • Communicating with other employees related to rules and regulations of an organization
  • Making various types of recommendations
  • Used for an inquiry purpose
  • providing various types of current status and new updates

According to the given question, Emails is one of the type of tool that is used as the communication medium and it is one of the flexible message delivery options which is widely used by an organizations.

 

6 0
3 years ago
Briefly discuss the aesthetics and ergonomics of a hydraulic jack. First explain what these
ehidna [41]

Answer:

For this model, aesthetics is defined as a measure of how attractive a product appears, and ergonomics is how well a product feels when used/held. ... Two important types of defects, part flash and crush, will be used to define ergonomic and aesthetic PA's, respectively.

5 0
2 years ago
Other questions:
  • The set of appearance choices for files and folders is known as the
    7·1 answer
  • Why do many administrators choose to use a command line interface on a Linux server?
    12·1 answer
  • A user reports that she can't access the new server used in the accounting department. you check the problem and find out that h
    9·1 answer
  • Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali
    6·1 answer
  • What does a computer need from people in order to solve problems effectively?
    9·1 answer
  • Which of the following describes the line spacing feature? Select all that apply. adds space between words adds space between li
    8·1 answer
  • Please solve in 5 mins very fast​
    11·2 answers
  • What did Bakers wear (1) in the Portugal does (2) when was author was young ???
    10·1 answer
  • Under the Home tab, controls for aligning text and objects can be found in the
    5·2 answers
  • Write a program that reads an integer, a list of words, and a character. The integer signifies how many words are in the list. T
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!