Which of the following is true about Hyper-V and VM security?

A. the permissions on the folder that holds the virtual disks should be Modify for Domain Users
B. VMs do not require firewalls or antivirus software since Hyper-V protects them
C. auditing should be enabled for sensitive virtual disks and configuration files
D. Only use Hyper-V integration services on low-risk VMs


Answer: C

Computer Science & Information Technology

You might also like to view...

The basic generic functional interface ________ in package java.util.function contains method apply that takes a T argument and returns a value of type R. Calls a method on the T argument and returns that method’s result.

a. Consumer b. Function c. Supplier d. BinaryOperator

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Along with managing time and resources, systems analysts must also manage people. 2. By comparing costs alone, the systems analyst can use break-even analysis to determine the break-even capacity of the proposed information system. 3. Intangible costs are those that can be accurately projected by the systems analyst and the business's accounting personnel. 4. Tangible costs include losing a competitive edge, losing the reputation for being first with an innovation or the leader in a field, declining company image due to increased customer dissatisfaction, and ineffective decision making due to untimely or inaccessible information. 5. When assembling a team, a project manager should look for people with both experience and enthusiasm.

Computer Science & Information Technology

What are the black point and white point of an image, and why are they important?

What will be an ideal response?

Computer Science & Information Technology

The Ribbon organizes commands into ________

Fill in the blank(s) with correct word

Computer Science & Information Technology