Your organization needs to retain a legacy application for the Inventory department. Next year, a new application will be purchased, and all the current data will be exported to the new application at that time. For the time being, you have been asked to retain the legacy application. The computer on which the legacy application resides can no longer be supported and must be removed from the

enterprise. You have been asked to implement a solution that allows the legacy application to remain in use. What should you do?

A. Deploy the legacy application on its own VLAN.
B. Deploy the legacy application on a virtual machine.
C. Deploy the legacy application on the DMZ.
D. Deploy the legacy application on a public cloud.


B
Explanation: You should deploy the legacy application on a virtual machine. This ensures that the legacy application is still supported while ensuring that the computer that it is on can be removed from the enterprise.
None of the other options will provide the same level of support and security as the virtual machine option.

Computer Science & Information Technology

You might also like to view...

During E-time, the arithmetic and logic unit executes the instruction stored in the __________.

a. instruction counter b. memory buffer c. instruction register d. memory controller

Computer Science & Information Technology

A numbered list would be appropriate for presenting the steps for opening a document in Word

Indicate whether the statement is true or false

Computer Science & Information Technology

As a function of normal, paper-based reading habits, the user's eye moves from ____ and back again.

A. top to bottom B. bottom to top C. left to right D. right to left

Computer Science & Information Technology

In time-shifting mode, there is a significant delay between when a message is sent and when it is received. 

Answer the following statement true (T) or false (F)

Computer Science & Information Technology