A Windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniquely configured VM stored in a public folder on the computer.
Which of the following steps should be taken to secure the VMs so no user can copy or delete another user’s VM files? (Select TWO.)
A. Install anti-malware software on each VM OS.
B. Secure the VM files with permissions.
C. Configure BIOS/UEFI passwords on the host computer.
D. Connect each VM to a separate, dedicated virtual NIC.
E. Install anti-malware software on the host OS.
F. Apply encryption to the VM files.
Ans:
B. Secure the VM files with permissions.
F. Apply encryption to the VM files.
You might also like to view...
A WPF style is a set of that can be reused for any number of controls.
a) property-value definitions b) event-handler definitions c) background images d) a and b.
Describe the stack memory (or data) structure. Give a four-word description of the stack discipline.
What will be an ideal response?
________ is an expression that precisely defines the range of data that will be accepted in a field
A) Range expression B) Validation rule C) Data expression D) Validation text
The content of a field is the _________.? A. field value B. field description C. field error D. common field
Fill in the blank(s) with the appropriate word(s).