1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
3 years ago
9

A windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniqu

ely configured VM stored in a public folder on the computer. Which of the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files (select two )a. install anti malware software on each VM OSb. secure the VM files with permissionsc. configure BIOS/UEFI passwords on host computerd. connect each VM to a separate, dedicated virtual NIC.e. Install anti-malware software on the host OS.f. Apply encryption to VM files.
Computers and Technology
1 answer:
Butoxors [25]3 years ago
5 0

Apply encryption to VM files the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files

f. Apply encryption to VM files.

b. secure the VM files with permissions

<u>Explanation:</u>

Installing anti-malware is a must on each VM OS OR Host OS to protect both servers and hosted workstations.

Scheduling update OS patches and anti-malware and scanning server or host operation are also must.

Securing VM files as best practices better to encrypt and decrypt is the best method or best practices.

Even protected VM files sometimes can be hacked and damaged the VM files.

VM is a virtual machine technology is used in windows 10. Before login decrypts the VM and connects to virtual machines. On disconnected encrypted is safer.

You might be interested in
Which part of the brain controls the movement of muscles​
Mekhanik [1.2K]

Answer:

PLEASE MARK AS BRAINLIEST

Explanation:

Cerebellum

Cerebellum. The cerebellum (back of brain) is located at the back of the head. Its function is to coordinate voluntary muscle movements and to maintain posture, balance, and equilibrium.

7 0
3 years ago
Where are the instructions stored that the computer needs when it is switched on?
WARRIOR [948]
This is stored in the ROM (Read Only Memory)
I believe that is the answer, all i can come up with.
4 0
3 years ago
Which two keys on the keyboard allow an access user to move the insertion point to the next field to the right in datasheet view
Mashcka [7]
Hey there!

In Microsoft Access, you can click the Tab key then the Enter key on your keyboard to establish a new insertion point directly to the right of your current insertion point when entering data in datasheet view. 

Hope this helped you out! :-)
4 0
3 years ago
Describe four features of a well designed input screen
Sladkaya [172]

Answer:

A well design input screen should:1.Be titled2.Navigation aids should be used

Explanation:

3 0
3 years ago
Read 2 more answers
Using Module operator, write a java program to print odd number between 0 and 1000​
jolli1 [7]

Answer:

class OddNumber

{

  public static void main(String args[])  

       {

         int n = 1000;  //Store 1000 in Variable n typed integer

         System.out.print("Odd Numbers from 1 to 1000 are:");  // Print headline of output window

         for (int i = 1; i <= n; i++)  //For loop to go through each number till end

          {

            if (i % 2 != 0)  //check if number is even or odd.Not divisible by 2 without reminder means it is odd number

             {

               System.out.print(i + " "); //print odd numbers

             }

          }

       }

}              

5 0
3 years ago
Other questions:
  • What type of elements are bridges exposed to yearly
    13·2 answers
  • Despite its vivid design, the website for Lolly's Bookstore did not seem to attract customers who lingered. In fact, most websit
    13·1 answer
  • Questions 1 )When does a spring tide take place?
    14·2 answers
  • if there are several web pages that you visit regularly what can you do to make accessing them more efficient?
    13·1 answer
  • List 5 different programming languages calls to print
    8·2 answers
  • Grbn kmjnhbgvfcdxswikmjnthbrvgt
    5·2 answers
  • In the history of Social Media what are two points that stood out?
    12·1 answer
  • Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control systems. Summarize th
    13·1 answer
  • Which of the following uses the proper syntax for creating an HTML comment?
    8·1 answer
  • Consider that a man is watching a picture of a Black Horse. He receives an external stimulus from input channel. Man gains some
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!