1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
3 years ago
9

A windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniqu

ely configured VM stored in a public folder on the computer. Which of the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files (select two )a. install anti malware software on each VM OSb. secure the VM files with permissionsc. configure BIOS/UEFI passwords on host computerd. connect each VM to a separate, dedicated virtual NIC.e. Install anti-malware software on the host OS.f. Apply encryption to VM files.
Computers and Technology
1 answer:
Butoxors [25]3 years ago
5 0

Apply encryption to VM files the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files

f. Apply encryption to VM files.

b. secure the VM files with permissions

<u>Explanation:</u>

Installing anti-malware is a must on each VM OS OR Host OS to protect both servers and hosted workstations.

Scheduling update OS patches and anti-malware and scanning server or host operation are also must.

Securing VM files as best practices better to encrypt and decrypt is the best method or best practices.

Even protected VM files sometimes can be hacked and damaged the VM files.

VM is a virtual machine technology is used in windows 10. Before login decrypts the VM and connects to virtual machines. On disconnected encrypted is safer.

You might be interested in
You can perform an in-place upgrade to Windows 7 from both Windows XP and Windows Vista
Ede4ka [16]

wait you can, how?

please explain

7 0
3 years ago
Read 2 more answers
Question 6 (1 point)
Marysya12 [62]
<h2>answers</h2>

Extranet

wifi create extranet so that our mobile network runs smoothly. it can create lan,wan also

7 0
3 years ago
Sometimes you're the dog, sometimes the fire hydrant, your thoughts?
yulyashka [42]
Sometimes your mean to people (dog peeing on fire hydrant) sometimes people are mean to you (being peed on)
8 0
3 years ago
The ________ is an area where you can position fields to use for filtering the PivotTable and thereby enabling you to display a
Studentka2010 [4]

Answer: FILTERS area

Explanation: PivotTable is the kind of a tool that is used for the calculation of the data by analyzing ,summarizing ,comparing it according to the pattern and the sequence of the data.In this this tool. filter is used as the component for the filtering of the data in small/minor unit by analyzing it deeply. Different filter techniques is used in analyzing of the spreadsheet in PivotTable.

3 0
3 years ago
give one word • pressure exerted by a stationary liquid _______. • force in a direction perpendicular to a given surface area __
mel-nik [20]

Answer:

1. Hydrostatic pressure.

2. Pressure.

3. Equilibrium forces.

Explanation:

1. <u>Hydrostatic pressure</u>: pressure exerted by a stationary liquid. It is simply the pressure in a liquid such as water at a specific depth.

Mathematically, hydrostatic pressure is given by the formula;

H.P = rho * g * d

Where:

  • H.P is the hydrostatic pressure of a liquid.
  • rho represents the density of a liquid.
  • g is the acceleration due to gravity.
  • d is the depth (height) of a liquid.

2. <u>Pressure</u>: it is the force in a direction perpendicular to a given surface area. Thus, it's typically measured in Newton per meters (N/m²).

Mathematically, pressure is given by the formula;

Pressure = \frac {Force}{area}

3. <u>Equilibrium forces</u>: a pair of forces whose resultant is zero. It is also referred to as balanced forces because the resultant of all the pair of forces acting on a body or system is at equilibrium (balanced).

6 0
3 years ago
Other questions:
  • Describe the Say It, Cover It, Resay It method.
    14·2 answers
  • Which finger types the highlighted keys on a number keypad? A. Third B. First C. Pinky D. Thumb
    7·2 answers
  • Your company sent several staff members for UML training. An outside vendor provided the training. Everyone who attended the tra
    5·1 answer
  • An individual who understands and uses a variety of symbols yet uses one symbol at a time to share a message needs more developm
    10·1 answer
  • For the function definition int SomeFunc( /* in */ int alpha, /* in */ int beta ) { int gamma; alpha = alpha + beta; gamma = 2 *
    6·2 answers
  • What is the best data structure to solve the following problem? a) A list needs to be built dynamically. b) Data must be easy to
    11·1 answer
  • In C++ please.
    8·1 answer
  • Which of the following is an easy steps to take to avoid ESSD well working on your computer?
    5·1 answer
  • What is the error in this?<br><br> userGuess = int(input(“Guess a number between 1 and 20: “))
    12·1 answer
  • The difference between page break and section brek​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!