A technician is using a network-attached desktop computer with a Type 2 hypervisor to run two VMs. One of the VMs is infected with multiple worms and other forms of known malware. The second VM is a clean installation of Windows. The technician has been tasked with logging the impact on the clean Windows VM when the infected VM attempts to infiltrate the clean VM through the network.
What should the technician do to best protect the company LAN while performing these tests?
A. Encrypt each VM and the host OS using disk-based encryption.
B. Enable the software firewalls on each VM OS and on the host OS.
C. Place both VMs on virtual NICs that are isolated from the company LAN.
D. Disable the virtual network interface controller in each VM OS.
Answer: C
You might also like to view...
When a payroll program verifies that no value greater than 168 is entered for the number of hours worked in a week (24 hours in a day X 7 days in a week), it is performing a __________ check.
Fill in the blank(s) with the appropriate word(s).
A(n) ____ is a name that refers to a piece of the program's memory, in which a value can be stored, retrieved, and changed.
A. element B. class C. variable D. object
What are the two functions of the RD virtualization host?
What will be an ideal response?
Create a list of all sections that indicates how many places are available in each section (i.e. capacity - # of students enrolled). Use decode to display a message of "Filled" if there are no more places; " <#> places available" (as in "10 places available) if capacity has not yet been reached but some are enrolled; and "None enrolled" if no one has enrolled. Use TO_CHAR to convert numbers to strings when needed. Use an outer join to include all the sections. (78 rows)
COURSE_NO SECTION_NO Places Available ---------- ---------- -------------------------- 25 1 20 places available 240 2 14 places available 134 3 24 places available 142 2 12 places available 145 3 None enrolled ...