1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
3 years ago
9

A windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniqu

ely configured VM stored in a public folder on the computer. Which of the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files (select two )a. install anti malware software on each VM OSb. secure the VM files with permissionsc. configure BIOS/UEFI passwords on host computerd. connect each VM to a separate, dedicated virtual NIC.e. Install anti-malware software on the host OS.f. Apply encryption to VM files.
Computers and Technology
1 answer:
Butoxors [25]3 years ago
5 0

Apply encryption to VM files the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files

f. Apply encryption to VM files.

b. secure the VM files with permissions

<u>Explanation:</u>

Installing anti-malware is a must on each VM OS OR Host OS to protect both servers and hosted workstations.

Scheduling update OS patches and anti-malware and scanning server or host operation are also must.

Securing VM files as best practices better to encrypt and decrypt is the best method or best practices.

Even protected VM files sometimes can be hacked and damaged the VM files.

VM is a virtual machine technology is used in windows 10. Before login decrypts the VM and connects to virtual machines. On disconnected encrypted is safer.

You might be interested in
Select the correct answer from each drop-down menu. Which IF formulas are valid? _____ and _____ are valid IF formulas.
Lyrx [107]

Answer:

=IF(D3>50; E3; F3) AND =IF(A1>60;"Pass";"Fail")

Explanation:

An IF structure is built following this pattern:

IF(TEST;IFTRUE;IFFALSE)

These are the only options in the given drop-down menus what comply with this pattern.  All others are not following this pattern.

The computer will do the test and if the result is true will apply the IFTRUE value, otherwise will apply the IFFALSE value.

4 0
3 years ago
What occurs when information is copied from an internet source to another computer?
Margarita [4]
The answer is pasting
3 0
3 years ago
thick is incorrect does anybody know the correct answer? please don’t send any files i can’t open them
77julia77 [94]

Answer:

i think its new

Explanation:

if this is incorrect i apologize

7 0
3 years ago
Which of the following is a trend that began during the Vietnam War and continued with the Internet?
Blizzard [7]
<span>As far as I remember, this one - a. a move toward stricter control of mass-media communications by Congress and the FCC </span><span>is a trend that began during the Vietnam War and continued with the Internet.</span>
7 0
2 years ago
A third party that provides a computer system such as Windows, programming applications, databases, and web servers is demonstra
Lostsunrise [7]

Answer:

Paas

Explanation:

I hope I helped!

6 0
2 years ago
Other questions:
  • The essence of strategy is ____, so competitive advantage is often gained when an organization tries a strategy that no one has
    15·1 answer
  • The main characteristic of ____ is that its source code is published with the software.
    7·1 answer
  • After you set a pin for a domain account on your laptop, that pin can be used only on your laptop. question 17 options:
    7·1 answer
  • What does the label display when the user clicks the button? void btnSubmit_Click(object sender, EventArgs e) { int num1 = 3; in
    7·1 answer
  • why is there a need of properly interpreting teacher's/manufacturer's specifications before operating any food processing equipm
    9·1 answer
  • Which activity represents a violation of the licensing agreement?
    13·2 answers
  • Water is constantly in motion.<br> True or false
    6·1 answer
  • What dog breed is this
    6·1 answer
  • Match the parts of the website address with its correct explanation. http://www.usa.gov/Agencies/federal.shtm/​
    5·2 answers
  • Creating a Numpy Array
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!