1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
3 years ago
9

A windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniqu

ely configured VM stored in a public folder on the computer. Which of the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files (select two )a. install anti malware software on each VM OSb. secure the VM files with permissionsc. configure BIOS/UEFI passwords on host computerd. connect each VM to a separate, dedicated virtual NIC.e. Install anti-malware software on the host OS.f. Apply encryption to VM files.
Computers and Technology
1 answer:
Butoxors [25]3 years ago
5 0

Apply encryption to VM files the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files

f. Apply encryption to VM files.

b. secure the VM files with permissions

<u>Explanation:</u>

Installing anti-malware is a must on each VM OS OR Host OS to protect both servers and hosted workstations.

Scheduling update OS patches and anti-malware and scanning server or host operation are also must.

Securing VM files as best practices better to encrypt and decrypt is the best method or best practices.

Even protected VM files sometimes can be hacked and damaged the VM files.

VM is a virtual machine technology is used in windows 10. Before login decrypts the VM and connects to virtual machines. On disconnected encrypted is safer.

You might be interested in
In Super Mario 64, a character called Lakitu follows Mario around on a cloud, filming him with a camera as though he were shooti
ella [17]

Answer:

A second person prespective

Explanation:

6 0
3 years ago
Read 2 more answers
Explain use of information and communication technology in our daily life.
lions [1.4K]

Answer:

It can improve the quality of human life because it can be used as a learning and education media, the mass communication media in promoting and campaigning practical and important issues, such as the health and social area. It provides wider knowledge and can help in gaining and accessing information.

<em>That</em><em>'</em><em>s</em><em> </em><em>my</em><em> </em><em>answer</em>

4 0
3 years ago
Programmers refer to programs that contain meaningful names as ____. AnswerThe answer is: Programmers refer to programs that con
andreyandreev [35.5K]
Self documenting, we also make comments.
3 0
3 years ago
Select all that apply.
bagirrra123 [75]

Answer:

explain

Explanation:

sorry didn't understand a thing you said except copying and pasting documents

3 0
3 years ago
Read 2 more answers
1.Given the IPv4 address, 200.245.10.150/28, how many subnets are possible and how many hosts can be supported by each subnet
konstantin123 [22]

Answer:

16 subnets and 14 hosts assignable IP addresses.

Explanation:

Computer networking is the interconnection and intercommunication of computer devices. These computer devices can be connected using cables or wirelessly. All devices in a network must have an IP address.

Subnetting a network is a process of preventing the waste of IP addresses for the purpose of security and cost. IP4 addresses are 32 bits in size (4 octets) and the host and subnet size is dependant on the host and network bit configuration.

The IP address 200.245.10.150/28 is a class A network address but subnetted to borrow four bits from the fourth octet to produce 16 subnets (2 ^ 4 bits borrowed) and 14 host IP addresses (2^ 4 bits remaining in the fourth octet - 2, which is the network and broadcast addresses).

3 0
3 years ago
Other questions:
  • A company has a network printer that is utilzed by several departments. Although the printer shows online and other departments
    11·1 answer
  • Rachel completed typing an official docment with a word processing program. She wants to make sure that her document has no typo
    15·2 answers
  • Assume the method doSomething has been defined as follows: public static void doSomething (int[] values, int p1, int p2) { int t
    6·1 answer
  • Write an expression to print each price in stock_prices. Sample output with inputs: 34.62 76.30 85.05
    9·1 answer
  • Which of the following involves writing hidden messages so that only the sender and intended recipient know a message exists? St
    5·1 answer
  • Which is the purpose of adding B-Roll footage to a sequence?
    10·1 answer
  • When you call a method with a parameter list, the arguments in the argument list Select one: a. must be coded in the same sequen
    15·1 answer
  • Which of the following expressions yields an integer between 0 and 100, inclusive? Question 5 options: (int)(Math.random() * 100
    6·1 answer
  • What is the most efficient<br> form of transportation we<br> have?
    13·2 answers
  • Write at least and explain four types of escape sequences and create an example in an IDE which consist of the mentioned escape
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!