What security options exist for a virtual machine within Hyper-V under the Hardware section?

What will be an ideal response?


Only available on generation two virtual machines, you have the option to enable Secure Boot, which blocks unauthorized software and operating systems from running at boot. You can also enable Trusted Platform Module (TPM) support, special hardware that handles cryptographic keys. Finally, you can enable Shielding, which disables some management features.

Computer Science & Information Technology

You might also like to view...

What are the steps to creating database-driven pages for a Linux server?

What will be an ideal response?

Computer Science & Information Technology

In the array implementation, under what circumstances could the rear reference equal 0?

What will be an ideal response?

Computer Science & Information Technology

What tab is accessed in order to print a slide show?

A) Insert B) Home C) Review D) File

Computer Science & Information Technology

Place into correct order the steps when conducting an investigation

I. First A. Transport the evidence to the lab II. Second B. Tag the evidence III. Third C. Bag the evidence IV. Fourth D. Document the evidence

Computer Science & Information Technology