Which of the following can be leveraged to allow the use of legacy applications that will not run on newer operating systems?
A. clustering
B. virtualization
C. NAT
D. firmware updates
B
Explanation : With recent advances in virtual technology, the organization can implement a virtual machine that fulfills the criteria for the application through virtualization.
You might also like to view...
Codecs are often bundled together into a single media player program to reduce confusion to the user
Indicate whether the statement is true or false
What is the purpose of the Input Manager?
What will be an ideal response?
Which of the following limits network access based on an organization’s access policy?
a. An antivirus software b. The concept of Reasonable assurance c. A firewall d. A browser
An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
A. masquerade B. interception C. repudiation D. inference