1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
3 years ago
9

A windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniqu

ely configured VM stored in a public folder on the computer. Which of the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files (select two )a. install anti malware software on each VM OSb. secure the VM files with permissionsc. configure BIOS/UEFI passwords on host computerd. connect each VM to a separate, dedicated virtual NIC.e. Install anti-malware software on the host OS.f. Apply encryption to VM files.
Computers and Technology
1 answer:
Butoxors [25]3 years ago
5 0

Apply encryption to VM files the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files

f. Apply encryption to VM files.

b. secure the VM files with permissions

<u>Explanation:</u>

Installing anti-malware is a must on each VM OS OR Host OS to protect both servers and hosted workstations.

Scheduling update OS patches and anti-malware and scanning server or host operation are also must.

Securing VM files as best practices better to encrypt and decrypt is the best method or best practices.

Even protected VM files sometimes can be hacked and damaged the VM files.

VM is a virtual machine technology is used in windows 10. Before login decrypts the VM and connects to virtual machines. On disconnected encrypted is safer.

You might be interested in
In general, the right amount of time to do freewriting is
zlopas [31]
THE correct answer is c 10 minuets
4 0
3 years ago
Read 2 more answers
Write a computer program to tell if the number is even or odd please
vovikov84 [41]
There you go :) Written in C# you can add using tags yourself I believe

3 0
3 years ago
Error: A JNI error has occurred, please check your installation and try again Exception in thread "main" java.lang.UnsupportedCl
vlada-n [284]

Answer:

You need to make sure that the unsupportedclassversionerror is a sub class of the linkage bug. Its a class format error. And this error is given by JVM as it tries to study the class file who minor and major version numbers are outdated. This error has been arising since Java 1.2 and is being thrown during the run time as well as most precisely during the linking phase.

It indicates that the current JVM is not supporting the class file of the application,

Hence,we must verify the installed version of java.

Explanation:

You need to make sure that the unsupportedclassversionerror is a sub class of the linkage bug. Its a class format error. And this error is given by JVM as it tries to study the class file who minor and major version numbers are outdated. This error has been arising since Java 1.2 and is being thrown during the runtime as well as most precisely during the linking phase.

It indicates that the current JVM is not supporting the class file of the application,

Hence,we must verify the installed version of java.

And we need to install the Java latest version.

We can find the Java version by  

Java -version

The following class can help in finding the version number of the class file.

FindMajorVersion.java:

import java.io.FileInputStream;

import java.io.InputStream;

import java.io.File;

import java.io.IOException;

import java.io.DataInputStream;

public class FindMajorVersion {

 

    public static void main(String[] args) throws IOException {

         // Verify at least one argument is being passed to the application class.

         if(args.length < 1)

              throw new RuntimeException("Usage: FindMajorVersion <path_to_class_file>");

 

         // Make a buffer for storing the first 8 bytes of a file.

         byte[] buffer1 = new byte[8];

 

         // Create an InputStream  

         InputStream is1 = new DataInputStream(new FileInputStream(new File(args[0])));

 

         // Read the first 8 bytes of the file.

         is.read(buffer);

 

         // Print out the major version number.

         System.out.println(buffer1[7] + " (" + String.format("0x%x", buffer1[7]) + ")");

 

         // Shut down the stream.

         is.close();

    }

}

You can thus find the appropriate version, and upgrade the java which is installed to the latest version. And thus, you can make it certain that all the Java apps are successfully executed inside the system.  

3 0
3 years ago
#include
Artist 52 [7]

Answer:

#include <iostream>

#include <vector>

using namespace std;

int main() {

const int NUM_VALS = 4;

vector<int> testGrades(NUM_VALS);

int i = 0;

int sumExtra = -9999; // Assign sumExtra with 0 before your for loop

testGrades.at(0) = 101;

testGrades.at(1) = 83;

testGrades.at(2) = 107;

testGrades.at(3) = 90;

/* Your solution goes here */

sumExtra = 0;

for(i = 0; i <= testGrades.size() -1; i++){

   if(testGrades.at(i) > 100){

       sumExtra = sumExtra + (testGrades.at(i) - 100);

   }

}

cout << "sumExtra: " << sumExtra << endl;

return 0;

}

Explanation:

Looks like you almost solved the question. I highlighted the parts you have been missing above.

In order to use vectors in C++, you need to add the vector library at the beginning of the program, #include <vector>

In order to initialize the vector, you need to specify its type inside <int>, since we work with the integers in the question the type must be <em>int</em>

3 0
3 years ago
Https://forms.gle/eP8F5eKC2AUaCsB67
Deffense [45]

Answer:

NO .THATS NOT A GOOD QUESTIONS.

Explanation:THOSE R PERSONAL

3 0
2 years ago
Other questions:
  • An office is facing a network issue. The technicians have determined that a virus affected the manager's computer. However, they
    15·1 answer
  • SQL a. has become the de facto standard database language b. can be used to define database systems c. both a. and b. d. none of
    10·1 answer
  • You have just taken over management of a server on which the previous server administrator has set up several server components,
    8·1 answer
  • Digital cameras always create great photographs. <br>True <br>False
    14·2 answers
  • Write down a program in SNOBOL thatcalculates the factorial of 7.
    10·1 answer
  • Suppose there are two hosts, S and R. They are communicating over a TCP connection, and R has already received from S al bytes f
    11·1 answer
  • HURRY!!!!!!!!!!!!!
    15·1 answer
  • c Write a program that simulates a magic square using 3 one dimensional parallel arrays of integer type. Each one the arrays cor
    6·1 answer
  • If an ______ is caught dumping hazardous materials, that person can be prosecuted. Answer choices A) Employee B) Employer C) Bot
    7·1 answer
  • 4.(L.5.1.A) Select the sentence that includes an interjection,
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!