Which of the following can be leveraged to allow the use of legacy applications that will not run on newer operating systems?

A. clustering
B. virtualization
C. NAT
D. firmware updates


B
Explanation : With recent advances in virtual technology, the organization can implement a virtual machine that fulfills the criteria for the application through virtualization.

Computer Science & Information Technology

You might also like to view...

Codecs are often bundled together into a single media player program to reduce confusion to the user

Indicate whether the statement is true or false

Computer Science & Information Technology

What is the purpose of the Input Manager?

What will be an ideal response?

Computer Science & Information Technology

Which of the following limits network access based on an organization’s access policy?

a. An antivirus software b. The concept of Reasonable assurance c. A firewall d. A browser

Computer Science & Information Technology

An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.

A. masquerade B. interception C. repudiation D. inference

Computer Science & Information Technology