1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
2 years ago
9

A windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniqu

ely configured VM stored in a public folder on the computer. Which of the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files (select two )a. install anti malware software on each VM OSb. secure the VM files with permissionsc. configure BIOS/UEFI passwords on host computerd. connect each VM to a separate, dedicated virtual NIC.e. Install anti-malware software on the host OS.f. Apply encryption to VM files.
Computers and Technology
1 answer:
Butoxors [25]2 years ago
5 0

Apply encryption to VM files the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files

f. Apply encryption to VM files.

b. secure the VM files with permissions

<u>Explanation:</u>

Installing anti-malware is a must on each VM OS OR Host OS to protect both servers and hosted workstations.

Scheduling update OS patches and anti-malware and scanning server or host operation are also must.

Securing VM files as best practices better to encrypt and decrypt is the best method or best practices.

Even protected VM files sometimes can be hacked and damaged the VM files.

VM is a virtual machine technology is used in windows 10. Before login decrypts the VM and connects to virtual machines. On disconnected encrypted is safer.

You might be interested in
Write a basic program that performs simple file and mathematical operations.
Ostrovityanka [42]

Answer:

Explanation:

I have written the Python program based on your requirements.

Just give the path of the input file and the path for the output file correctly where you want to place the output file.

In, my code - I have given my computer's path to the input and output file.

You just change the path correctly

My code works perfectly and I have tested the code with your inputs.

It gives the exact output that you need.

I have attached the Output that I got by running the below program.

Code:

month_list={ "january":"1","february":"2", "march":"3","april":"4", "may":"5", "june":"6","july":"7", "august":"8", "september":"9","october":"10", "november":"11", "december":"12"} input_file=open('C:\\Users\\Desktop\\inputDates.txt', 'r') output_file=open('C:\\Users\\Desktop\\parsedDates.txt','w') for each in input_file: if each!="-1": lis=each.split() if len (lis) >=3: month=lis [0] day=lis[1] year=lis [2] if month.lower() in month_list: comma=day[-1] if comma==',': day=day[:len (day)-1] month_number=month_list[month.lower()] ans-month_number+"/"+day+"/"+year output_file.write (ans) output_file.write("\n") output_file.close() input_file.close()

- O X parsedDates - Notepad File Edit Format View Help 3/1/1990 12/13/2003

- X inputDates - Notepad File Edit Format View Help March 1, 1990 April 2 1995 7/15/20 December 13, 2003 -1

cheers i hope this helped !!

7 0
3 years ago
To change a selected shape’s height or width to a specific value, type the value in the Height or Width text boxes on the
Scrat [10]
Are you trying to change the shape of an item within your program by entering the values into text boxes that become variables?

What language are you using?
5 0
3 years ago
Which statement best describes network security
Andreyy89
<span>B.network security means all personal information is kept safe the network is not compromised and only authorized users had access 

Im pretty sure they ment has instead of had</span><span />
3 0
2 years ago
Read 2 more answers
When web developers specify color values for text or backgrounds, they often represent RGB (red-green-blue) colors using a six-d
neonofarm [45]

Answer: A #3f107f.

Letter B would produce a lighter blue-purple color rather than a darker shade of purple. Letter C would produce a very light purple color. Letter D would produce a Black color, making it very dark and not in the range of being purple.

Letter A would produce a darker shade of purple. As explained in the way that the RGB color hexadecimal uses, the amount of each respective color is 2 digits for each color Red, Green, Blue respectively.  By reducing the amount of each color in the RGB mode, the output will become a darker shade as the RGB mode is an ADDITITIVE type of color mode.

7 0
3 years ago
The most common size for a brochure is _____.
Juli2301 [7.4K]
3.5X2 cannot be the answer as it too small and not enough information can be put into it. The common size for tri-fold brochures is 8.5X11 or letter size even when 8.5X14 is also a size used it is not the most common size.
6 0
3 years ago
Other questions:
  • An ______ search is when the buyer looks for information beyond personal knowledge to help make the buying decision, such as che
    10·1 answer
  • What is the difference between a fragment shader and vertex shader? How do they relate?
    8·1 answer
  • What is the best option for sharing Word documents on a Microsoft network because it provides finer degrees of versioning contro
    6·1 answer
  • What expressions will initialize d with a random value such that all possible values for d are given by the inequality 1.5 ≤ d &
    8·1 answer
  • Which one of the following items is an example of software?
    5·1 answer
  • Giải thích mục đích của các thao tác open() và close().
    6·2 answers
  • Write a program that prompts the user to enter their name store this value in a variable called name Prompt the user for their c
    10·1 answer
  • Pls awnser if awnser is wrong I will unmark brainliest
    5·1 answer
  • How is data written to a blockchain?
    10·1 answer
  • What's the commission payout for auto bill pay if sold with a ga?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!