<h2>
Answer:</h2>
Authorization specifies what a user can do, and access control enforces what a user can do.
<h2>
Explanation:</h2>
Authorization is simply granting access to an authenticated user of an application. It specifies what a user can and/or cannot do. For example, for a user to access their banking details in an online banking service, they have to be authorized by first authenticating them to prove their identity. Another example is in an organizational system where some users (normally called admins) can access certain database info whereas some other users (normally called the regular users) cannot.
Access control is used to enforce the policies dictated by authorization. In other words, access control enforces the policy of what a user can and/or cannot do. Access control makes authorization possible. It is sometimes called privileges or permissions. For example, the <em>security tab </em>in the operating system of Windows, allow to set access privileges for certain files and/or folders. Another example is in an organizational system where some files on the organization's server are configured in such a way that access to it is restricted and dependent on some further authorization.
Explanation:
can u suggest a title about quarantine
ex: My quarantine life
One way to track who made these changes to the virtual machine cloud settings and when is to: D. enable cloud resource activity auditing.
<h3>What is a cloud?</h3>
In Computer technology, a cloud can be defined as the elastic leasing of pooled computer resources such as physical hardware through virtualization and over the Internet, so as to enable the storage and sharing of files and documents virtually and in real-time.
In this scenario, we can reasonably infer and logically conclude that one way to track who made these changes to the virtual machine cloud settings and when is to enable cloud resource activity auditing because it would provide a log of actions such as information about the engineer who made configuration changes.
Read more on a virtual machine here: brainly.com/question/12060797
#SPJ1
Complete Question:
Over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. You need a way to track who made these changes and when. What should you do?
A. Enable virtual machine API integration.
B. Rotate the cloud access keys.
C. Deploy an OSI layer 7 firewall.
D. Enable cloud resource activity auditing.
Answer:
ReFS format and Storage Spaces.
Explanation:
ReFS(Resilient File System)format was introduced in 2012 and it was the replacement for NTFS(NT File System).It was introduced as a part of the Windows Server.ReFS supports maximum value of 1 yottabyte (1 one million Terabytes). It also supports auto-correct form disk errors and data corruption.You need a storage space to store the data hence we need storage space also.