1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
3 years ago
9

A windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniqu

ely configured VM stored in a public folder on the computer. Which of the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files (select two )a. install anti malware software on each VM OSb. secure the VM files with permissionsc. configure BIOS/UEFI passwords on host computerd. connect each VM to a separate, dedicated virtual NIC.e. Install anti-malware software on the host OS.f. Apply encryption to VM files.
Computers and Technology
1 answer:
Butoxors [25]3 years ago
5 0

Apply encryption to VM files the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files

f. Apply encryption to VM files.

b. secure the VM files with permissions

<u>Explanation:</u>

Installing anti-malware is a must on each VM OS OR Host OS to protect both servers and hosted workstations.

Scheduling update OS patches and anti-malware and scanning server or host operation are also must.

Securing VM files as best practices better to encrypt and decrypt is the best method or best practices.

Even protected VM files sometimes can be hacked and damaged the VM files.

VM is a virtual machine technology is used in windows 10. Before login decrypts the VM and connects to virtual machines. On disconnected encrypted is safer.

You might be interested in
Seth is considering advertising his business using paid search results.What do you think makes paid search advertising so effect
pychu [463]

You haven't given any statements to choose from, but I can explain why paid search results are effective.

Paid seach results market to consumers that are interested in the product or similar products. These consumers are more likely to buy the product, since they are searching for a similar term. Paid search results can reach many people in very little time, and their resulting marketing benefits are almost instantaneous.

5 0
3 years ago
Read 2 more answers
Today you turned on your computer after being on vacation for a week. You see spinning white dots on a black screen. You decide
inn [45]

Since after update of operating system patches the end user see dots in black screen, either end user has to restore operating system old back up if he or she has or boot the operating system in safe mode.

<u>Explanation:</u>

On safe mode end user can repair the operating system; in repair mode still operating system cannot repair the operating system on same safe mode uninstall patches or recent updates of operating system during vacation.

Still it is workstation or laptop or desktop is not restoring it normally better to format and reinstall the operating system.

6 0
4 years ago
Problem (Commands): Let c be a copy flag and let a computer system have the set of rights {read, write, execute, append, list, m
dlinn [17]

Answer:

Aee explaination

Explanation:

1.

command copy_all_rights(p,q,s)

if read in a[p,s]

then

enter read into a[q,s];

if write in a[p,s]

then

enter write into a[q,s];

if execute in a[p,s]

then

enter execute into a[q,s];

if append in a[p,s]

then

enter append into a[q,s];

if list in a[p,s]

then

enter list into a[q,s];

if modify in a[p,s]

then

enter modify into a[q,s];

if own in a[p,s]

then

enter own into a[q,s];

end

2.

command copy_all_rights(p,q,s)

if own in a[p,s] and copy in a[p,s]

then

enter own into a[q,s];

if modify in a[p,s] and copy in a[p,s]

then

enter modify into a[q,s];

if list in a[p,s] and copy in a[p,s]

then

enter list into a[q,s];

if append in a[p,s] and copy in a[p,s]

then

enter append into a[q,s];

if execute in a[p,s] and copy in a[p,s]

then

enter execute into a[q,s];

if write in a[p,s] and copy in a[p,s]

then

enter write into a[q,s];

if read in a[p,s] and copy in a[p,s]

then

enter read into a[q,s];

delete copy in a[q,s];

end

3.

"q" would be the effect of copying the copy flag along with the right, because q would have copy right to transfter to another, which may not be intended.

3 0
4 years ago
When individuals are purchasing a computer, they sometimes might get the most expensive computer they can afford. Why might this
timama [110]

Answer:

Expensive is not always better

Explanation:

So I build 2 computers ok

Computer 1: Price 1,999$

<u>Whats Included:</u>

  • Antivirus
  • Anti-Over-Heat
  • Windows 8 Operating Software
  • Free VPN (For Life)
  • 24/7 Support
  • 1 year warranty
  • 3/5 Star Reviews | Main Review Type: Parts Breaking Inside

Computer 2: Price 799$

<u>Whats Included:</u>

  • Anti Virus
  • Anti Over-Heat
  • 1 Year Warranty
  • Windows 10 Operating Software
  • 24/7 Support
  • 10 Year Warranty
  • 4/5 Star Reviews | Main Review Type: Runs Smooth
  • No VPN

<h2>So Computer 2 Has better reviews and a 10 year warranty over computer 1's 1 year warranty</h2>
8 0
2 years ago
The intranet is the same as the internet. true false
galina1969 [7]
False, the intranet <span> does not refer to a network that supports communication between different organizations.</span>
5 0
3 years ago
Read 2 more answers
Other questions:
  • What device can boost an analog signal? a digital signal?
    12·1 answer
  • What the benefit is of folders when working with files
    13·2 answers
  • Which is the last step in conducting a URL search?
    6·1 answer
  • Another name for a chart is “Matrix.” Is that true or False
    8·2 answers
  • Micah may be able to repeat the last few digits in a phone number even if he was not paying attention. Because this is auditory
    13·1 answer
  • Sequence encryption is a series of encryptions and decryptions between a number of systems, wherein each system in a network dec
    9·1 answer
  • Stages of reverse engineering
    8·1 answer
  • Typically, a DVD has how many times more capacity than a CD?
    12·1 answer
  • What is the difference between special purpose software and customized software​
    8·2 answers
  • Name the two additional tabs that appear on selecting a chart​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!