1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
netineya [11]
3 years ago
12

Josh, as an administrator for a health care company, is required to support an older, legacy application. He’s concerned about t

he application having some vulnerabilities that would affect the remainder of the network. Of the following, which option is the most efficient way to mitigate this?A) Use an application containerB) Implement SDNC) Run the application on a separate VLAND) Insist on an updated version of the application
Computers and Technology
1 answer:
IRINA_888 [86]3 years ago
8 0

Answer:

Use an application container.

Explanation:

Host operating system is software installed in a computer that interacts virtually with a server and also describes the difference between its software and a guest operating system.

It interacts with the hardware and works with atype 2 hypervisor which does not interact with the hardware but create virtual machine interfaces for multiple guest operating system to be installed, which are not necessarily the same as the host os.

Host os can also be used to describe  operating systems that make use of container based virtualization. Containers are storage partitions used to hold applications separately on the same server, instead of replicating the operating system.

So with a container, Josh can separate the legacy application from other applications in the server.

You might be interested in
When viewing data entered into a spreadsheet, the columns identify _____.?
AlexFokin [52]
The answer is : variables
When viewing data entered into a spreadsheet, the columns identify Variable. The variables later can be used on a formula to help you process any sort of data that is implemented within excels' formula system
3 0
3 years ago
Which kind of image is indispensable and needs added text to go with it
grigory [225]
It may be an image that is on the internet, without a caption visually impaired will not understand
7 0
3 years ago
You want to get an average of the number of siblings people in a group have. Which data format would be best for you to receive?
never [62]

The data format would be best for you to receive is Spreadsheet.

<h3>What is spreadsheet?</h3>

A spreadsheet is a computer program that allows you to compute, organize, analyze, and store data in tabular form. Spreadsheets were created as electronic counterparts to paper accounting spreadsheets. The software runs on data entered into table cells. Each cell can include numeric or text data, as well as the results of formulas that calculate and display a value dependent on the contents of other cells. One such electronic document may also be referred to as a spreadsheet.

Spreadsheet users can change any recorded value and see how it affects calculated numbers. Because of this, the spreadsheet is ideal for "what-if" analysis because many situations may be studied quickly without human recalculation. Modern spreadsheet software can include numerous interacting sheets and display data as text and numbers or as graphics.

To learn more about spreadsheet visit:

brainly.com/question/8284022

#SPJ4

6 0
1 year ago
Which command should you use to display both listening and non-listening sockets on your linux system? (tip: enter the command a
trasher [3.6K]

Answer: netstat -a

Explanation: The netstat -a command displays both listening and non-listening sockets.

3 0
2 years ago
Develetech has a security policy that mandates a basic security feature for mobile device access. What is this basic security fe
kirill [66]

Answer:A password or a PIN

Explanation: Develetech is a industry that has the a internet page and can also be used in the mobile devices. There is particular authorization that the organization provides to an individual user for accessing of the services to maintain the security .The security is maintained by providing the devices with an encrypted text that is known as the password. The user has to enter the pin or password to execute the service on device.

5 0
3 years ago
Other questions:
  • Charlie is taking his slide presentation to a meeting at a remote location. He saves his presentation as a package on a CD. Char
    15·2 answers
  • The company currently runs 60 autonomous APs and has plans to increase wireless density by 50% in the near future
    13·1 answer
  • Determine the number of bytes necessary to store an uncompressed binary image of size 4000 × 3000 pixels
    11·1 answer
  • If you were looking for a record in a very large database and you knew the ID number, which of the following would be the most d
    6·1 answer
  • How would you define media literacy?
    12·1 answer
  • While speech recognition can operate without any confi guration, you can train it to more accurately recognize your voice. true
    5·1 answer
  • Plymouth Colony was originally founded by a group of people called Pilgrims. Since Plymouth did not have an official charter fro
    15·1 answer
  • Which engineer may design a GPS for a vehicle?
    15·1 answer
  • How to transfer mysql database from one server to another
    6·1 answer
  • A related database stores data in the form of______
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!