1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prisoha [69]
4 years ago
6

In a mission critical environment, performing maintenance operations on a host FIRST requires which of the following?

Computers and Technology
1 answer:
jonny [76]4 years ago
5 0

Answer: (B) Migrating all VMs off the host.

Explanation:

  VMs migration is the virtual machine migration that basically change the workloads automatically in the system. The maintenance of the schedule results into the downtime in the server for users. In the mission critical environment, when we performing various types of maintenance operation on the host we first require migrate all the virtual machine.

 In the critical environment there is a chance that the data in the given host may be critical and the data in the virtual machine (VM) may be in critical position in the host.

You might be interested in
Which two tools used for incident detection can be used to detect anomalous behavior, to detect command and control traffic, and
allsm [11]

Netflow and IDS (intrusion detection system) are the two tools used for incident detection can be used to detect anomalous behavior, to detect command and control traffic, and to detect infected hosts.

The Netflow is CISCO feature used for collecting IP traffic information and monitoring network traffic on a specific interface. Similar to this, IDS is an a<span>pplication that monitors a network or systems for malicious activity or policy violations.</span>

8 0
4 years ago
Compare a Wi-Fi hotspot with a cybercafé.
erik [133]

Answer:

A WiFi Hotspot is a wireless internet connection that allows a computer, smartphone, or any other internet-enabled devices to connect to internet access points.

A cybercafe refers to any business place that allows people to access the internet usually within its premises after paying for connection access to connect to it.

Explanation:

3 0
3 years ago
Both Wireshark and NetWitness Investigator can be used for packet captures and analysis. Which tool is preferred for each task,
NikAS [45]

Answer:

  • <u>packet capture best suited for Wireshark </u>
  • <u>packet analysis best suited for Netwiness</u>

Explanation:

Although both software packages can carry out each task, however, expert network administrators have noted that in terms of effectiveness, the Wireshark software application is best suited for packet capture since unlike Netwitness has no limitation on the size of files it can capture.

Whereas, because Netwitness has a capacity of up to seven-layer protocol analysis, it can perform a more detailed analysis of packets.

5 0
3 years ago
"what is the #1 resource used when researching a product online?"
BARSIC [14]
I believe it would be customer reviews.
6 0
3 years ago
Laser printers are particularly effective for printing _______________.
AVprozaik [17]
Full color images.
Hope this helps.
6 0
4 years ago
Other questions:
  • A ____ is a structure that allows repeated execution of a block of statements.
    13·2 answers
  • Describe data center technology and its relevance to modern-day cloud computing. Support your opinion with cited information.( S
    14·1 answer
  • Compare and contrast an example of an actual company that has a brick and mortar location with an actual company that does not h
    8·1 answer
  • Which best describes the Help feature of Word?
    13·2 answers
  • Items that represent features of smartphones apps
    12·1 answer
  • A boundary marks the inside and outside of a system and sets the system apart from its environment.
    11·1 answer
  • To copy an item, you would:
    15·2 answers
  • Why linked list is better than an array?
    7·1 answer
  • Computers and their input and output devices require power to work and may have many power cords. What is the safest way to orga
    7·1 answer
  • Which of the following can be used to enter or display one complete row of information in a range or table without scrolling hor
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!