1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
netineya [11]
3 years ago
12

Josh, as an administrator for a health care company, is required to support an older, legacy application. He’s concerned about t

he application having some vulnerabilities that would affect the remainder of the network. Of the following, which option is the most efficient way to mitigate this?A) Use an application containerB) Implement SDNC) Run the application on a separate VLAND) Insist on an updated version of the application
Computers and Technology
1 answer:
IRINA_888 [86]3 years ago
8 0

Answer:

Use an application container.

Explanation:

Host operating system is software installed in a computer that interacts virtually with a server and also describes the difference between its software and a guest operating system.

It interacts with the hardware and works with atype 2 hypervisor which does not interact with the hardware but create virtual machine interfaces for multiple guest operating system to be installed, which are not necessarily the same as the host os.

Host os can also be used to describe  operating systems that make use of container based virtualization. Containers are storage partitions used to hold applications separately on the same server, instead of replicating the operating system.

So with a container, Josh can separate the legacy application from other applications in the server.

You might be interested in
my homework guides Write the definition of a method printDottedLine, which has no parameters and doesn't return anything. The me
Masteriza [31]

Answer:

   public static void printDottedLine(){

       System.out.print(".....\n");

   }

Explanation:

This method returns nothing so its return type is void

It also accepts no parameters so the argument list is empty

When called it executes the  System.out.print(".....\n"); which prints out 5 dots

See a complete program below:

public class TestClock {

   public static void main(String[] args) {

   printDottedLine();

   }

   public static void printDottedLine(){

       System.out.print(".....\n");

   }

}

8 0
3 years ago
Once a business determines that change needs to occur, what ahould the
Lady bird [3.3K]

Answer:

D. Business strategy

Explanation:

Kono Dio Da!!

7 0
3 years ago
Mika forgot to put in the function name in his function header for the code below. What would be the best function
kondaur [170]

Answer:

I think it's A, def drawDiamond():

Explanation:

5 0
3 years ago
(a) Explain the term formatting a disk for storage.​
Elena L [17]

Answer:

Disk formatting is the process of preparing a data storage device such as a hard disk drive, solid-state drive, floppy disk or USB flash drive for initial use. In some cases, the formatting operation may also create one or more new file systems. The first part of the formatting process that performs basic medium preparation is often referred to as "low-level formatting".[1] Partitioning is the common term for the second part of the process, making the data storage device visible to an operating system.[1] The third part of the process, usually termed "high-level formatting" most often refers to the process of generating a new file system.[1] In some operating systems all or parts of these three processes can be combined or repeated at different levels[3] and the term "format" is understood to mean an operation in which a new disk medium is fully prepared to store files. Some formatting utilities allow distinguishing between a quick format, which does not erase all existing data and a long option that does erase all existing data.

As a general rule,[nb 1] formatting a disk by default leaves most if not all existing data on the disk medium; some or most of which might be recoverable with privileged[nb 2] or special tools.[4] Special tools can remove user data by a single overwrite of all files and free space.[5]

Explanation:

PLEASE MARK ME AS BRAINLIEST

6 0
3 years ago
Which command would you use on a switch to enable management from a remote network?
Savatey [412]
<span>IP default-gateway 192.168.10.185</span>
7 0
4 years ago
Other questions:
  • A _____ is a link on a web page that leads to another web page.
    13·1 answer
  • This type of technology does not come with a keyboard or mouse for input
    11·2 answers
  • A forensic investigator at a crime lab is performing a forensic analysis of a hard drive that was brought in by state troopers.
    10·1 answer
  • .true or false? one disadvantage of cloudware is that it is never free<br> A. true<br> B. false
    12·1 answer
  • Is orange named after the fruit or of the color?
    9·1 answer
  • Stephanie would like to know the average number of regular hours worked by her employees. In cell B11, create a formula using th
    8·1 answer
  • Which of the following shows the correct order of inventions that helped the first computers make calculations?
    9·1 answer
  • How to turn off location on iphone without person knowing
    15·1 answer
  • SUB2 WWolfPlays on yt <br><br><br> true or false if false ima cri
    8·2 answers
  • Send link for a qc or paddle
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!