1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
3 years ago
9

A windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniqu

ely configured VM stored in a public folder on the computer. Which of the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files (select two )a. install anti malware software on each VM OSb. secure the VM files with permissionsc. configure BIOS/UEFI passwords on host computerd. connect each VM to a separate, dedicated virtual NIC.e. Install anti-malware software on the host OS.f. Apply encryption to VM files.
Computers and Technology
1 answer:
Butoxors [25]3 years ago
5 0

Apply encryption to VM files the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files

f. Apply encryption to VM files.

b. secure the VM files with permissions

<u>Explanation:</u>

Installing anti-malware is a must on each VM OS OR Host OS to protect both servers and hosted workstations.

Scheduling update OS patches and anti-malware and scanning server or host operation are also must.

Securing VM files as best practices better to encrypt and decrypt is the best method or best practices.

Even protected VM files sometimes can be hacked and damaged the VM files.

VM is a virtual machine technology is used in windows 10. Before login decrypts the VM and connects to virtual machines. On disconnected encrypted is safer.

You might be interested in
When you tell an acquaintance your telephone number, you do not recite the digits one by one at a constant rate, as in "3, 3, 7,
yKpoI14uk [10]

Answer:

chunking and short-term is the correct answer of this question.

Explanation:

chunking is a strategy to enhance a short-term memory.

Chunking is an method used to separate larger numbers that can not be psychologically separated.Chunking is the grouping of words in one sentence into short, important phrases. A chunk is the material segment that is used in many graphical formats, such as PNG etc.

Short-term memory is the knowledge a person is considering or is conscious of. This is also called healthy or main memory.

3 0
3 years ago
Most users find settings between ____ to be the most convenient option for how long the computer sits idle before the screen sav
Sphinxa [80]
I would say about 5 to 10 minutes
3 0
3 years ago
Tuple in Python code help pleaseee!!! And of course I'll make you as Branlist
GuDViN [60]

<u>Question 9:</u>

The correct answer would be either (b) or (d).

<u>Question 10:</u>

<u></u>

The correct answer would be (b).

Hope it helps. :)

7 0
2 years ago
Dawn is trying to find out how much weight she can push across the room. She is really trying to find her __________. A. flexibi
Marrrta [24]

<em>The correct answer is d. muscular strength.</em>

<em></em>

<em>Explanation :</em>

<em></em>

<em>The maximal force a muscle can create when it contracts is referred to as muscular strength. When compared to someone with lower physical strength, someone with better muscular strength can lift heavier weights. Lifting progressively larger weights over time and eating a diet rich in protein-based foods can help a person's physical strength gradually grow.</em>

<em></em>

<em>I hope this helps. Please mark "Brainliest" if you can.</em>

8 0
2 years ago
Which of the following is a type of intangible business property that is protected by law
xz_007 [3.2K]
Google might be it ok
6 0
3 years ago
Other questions:
  • Cleaning the keyboard is the most important part of keeping your computer running at peak performance.
    5·2 answers
  • Create a new file that contains a summary of the total consumption for three sectors: "Residential," "Commercial," and "Industri
    10·1 answer
  • Why do we need to send emails
    12·1 answer
  • Design a class that has an array of floating-point numbers. The constructor should accept an integer argument and dynamically al
    7·1 answer
  • In C++ please.
    8·1 answer
  • Hi everyone,
    6·1 answer
  • Copyright laws protect:This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task a
    6·1 answer
  • Why would an end-user not generally buy a server? Explain your answer by referring to the typical role that servers perform. ​
    12·1 answer
  • Big Data, Apple Pie, and the Future In this unit, you were introduced to various kinds of software, particularly databases. Data
    13·1 answer
  • A type of attack where the adversary intercepts network packets, modifies them, and inserts them back into the network is called
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!