Which of the following is NOT a guideline for handling legacy applications?
A. Limit physical access to the legacy applications to administrators.
B. If possible, deploy legacy applications on a physical machine.
C. Employ access control lists (ACLs) to protect the data on the system.
D. Deploy the highest level authentication and encryption mechanisms as possible.
B
Explanation: If possible, deploy legacy applications on a virtual machine.
You might also like to view...
Speech recognition software can be integrated with graphics software.
Answer the following statement true (T) or false (F)
Think of different users for the database of Figure 1.2. What type of applications would each user need? To which user category would each belong and what type of interface would they need?
What will be an ideal response?
Describe characteristic of utility as it relates to information.
What will be an ideal response?
Name the three classes of Bluetooth and their maximum distances.
What will be an ideal response?