Which of the following is NOT a Hyper-V server setting?

A. virtual hard disk location
B. NUMA spanning
C. user credentials
D. virtual machine location


Answer: C

Computer Science & Information Technology

You might also like to view...

The term ________ means the ability to take many forms.

A) inheritance B) polymorphism C) member function D) encapsulation E) None of the above

Computer Science & Information Technology

Which of the following data types can be used to create files and read information from them into memory?

a. ofstream b. istream c. ifstream d. instream e. None of these

Computer Science & Information Technology

Review the solutions proposed in the discussion of the Wireless Equivalent Privacy protocol design, outlining ways in which each solution could be implemented and discussing any unresolved issues or drawbacks.

a) Sharing a single key: Solution, use a public-key based protocol for negotiating individual keys. b) Base stations are never authenticated: Solution, base stations should supply a certificate. c) Inappropriate use of a stream cipher: Solution: Negotiate a new key after a time less than the worst case for repetition. An explicit termination code would be needed, as is the case in TLS. d) The RC4 stream cipher weakness Solution: Provision for the negotiation of cipher specifications e) Users often didn’t deploy the protection Solution: Better default settings and documentation.

Computer Science & Information Technology

Assume p is a Polygon, to add a point (4, 5) into p, use _______.

a. p.getPoints().add(4); p.getPoints().add(5); b. p.getPoints().add(4.0); p.getPoints().add(5.0); c. p.getPoints().addAll(4, 5); d. p.getPoints().addAll(4.0, 5.0);

Computer Science & Information Technology