A Windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniquely configured VM stored in a public folder on the computer.
 
Which of the following steps should be taken to secure the VMs so no user can copy or delete another user’s VM files? (Select TWO.)

A. Install anti-malware software on each VM OS.
B. Secure the VM files with permissions.
C. Configure BIOS/UEFI passwords on the host computer.
D. Connect each VM to a separate, dedicated virtual NIC.
E. Install anti-malware software on the host OS.
F. Apply encryption to the VM files.


Ans:
B. Secure the VM files with permissions.
F. Apply encryption to the VM files.

Computer Science & Information Technology

You might also like to view...

A WPF style is a set of that can be reused for any number of controls.

a) property-value definitions b) event-handler definitions c) background images d) a and b.

Computer Science & Information Technology

Describe the stack memory (or data) structure. Give a four-word description of the stack discipline.

What will be an ideal response?

Computer Science & Information Technology

________ is an expression that precisely defines the range of data that will be accepted in a field

A) Range expression B) Validation rule C) Data expression D) Validation text

Computer Science & Information Technology

The content of a field is the _________.? A. field value B. field description C. field error D. common field

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology