1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
3 years ago
9

A windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniqu

ely configured VM stored in a public folder on the computer. Which of the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files (select two )a. install anti malware software on each VM OSb. secure the VM files with permissionsc. configure BIOS/UEFI passwords on host computerd. connect each VM to a separate, dedicated virtual NIC.e. Install anti-malware software on the host OS.f. Apply encryption to VM files.
Computers and Technology
1 answer:
Butoxors [25]3 years ago
5 0

Apply encryption to VM files the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files

f. Apply encryption to VM files.

b. secure the VM files with permissions

<u>Explanation:</u>

Installing anti-malware is a must on each VM OS OR Host OS to protect both servers and hosted workstations.

Scheduling update OS patches and anti-malware and scanning server or host operation are also must.

Securing VM files as best practices better to encrypt and decrypt is the best method or best practices.

Even protected VM files sometimes can be hacked and damaged the VM files.

VM is a virtual machine technology is used in windows 10. Before login decrypts the VM and connects to virtual machines. On disconnected encrypted is safer.

You might be interested in
What are the examples of shareware?
Igoryamba

Answer:

An example of shareware a compression program like Stuffit for Macs or Windows. An example of shareware is a budgeting software program that only allows you to use three categories instead of having the ability to create a full budget.

8 0
2 years ago
Read 2 more answers
Point out the correct statement.
NeTakaya

Answer:

Option D is correct.

Explanation:

Cassandra labeling information with such a gravestone indicates should restart transmitting an erase request to such a duplicate that had been down earlier of deletion.

Cassandra may not instantly delete information labeled for removal from disc the removal of identified information takes place throughout compaction a deleted section may reappear when a maintenance is never regularly carried out.

4 0
2 years ago
⚠VERY IMPORTANT MESSAGE⚠
Wittaler [7]

Thank you for this message!

Whoever is reading this, please stay safe from those scammers.

このメッセージをありがとう!

これを読んでいる人は誰でも、それらの詐欺師から安全を守ってください。

이 메시지에 감사드립니다!

이 글을 읽는 사람은 사기꾼들로부터 안전을 유지하십시오.

Quien esté leyendo esto, manténgase a salvo de esos estafadores.

7 0
2 years ago
Read 2 more answers
All resources are limited. Which of the following is NOT a resource?
gladu [14]
The appropriate answer is C ! all other are very limited but labour can be increased or decreased according to our will and it doesn't exhaust !
3 0
3 years ago
The shapes of AND, OR, and NOR gates have something in common. What is it and why do you think they share that feature?
irina1246 [14]
There're all conjunctions.

You can seperate them in sentences after a comma for a run-on sentence.
4 0
2 years ago
Other questions:
  • Which social media marketing concept engages visitors, getting them to revisit your website and tying them to offline events for
    7·2 answers
  • What's the risk or effect of software piracy?
    12·2 answers
  • "where is a cookie that is created during a web site visit​ stored?"
    9·1 answer
  • TCP will guarantee that your packets will arrive at the destination, as long as the connection is still established. True False
    11·1 answer
  • Give an example of an app, website, or a game that used addictive design. Describe three features of addictive design it uses.
    11·2 answers
  • Which model represents any process in general?
    6·1 answer
  • It is a data being transported on a network​
    13·1 answer
  • What is the meaning of FTTH
    9·2 answers
  • What is the difference between php and html?​
    13·2 answers
  • What is Utility Software ? Name any two utility programs. <br>​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!