Which of the following virtualized components would provide a secure operating environment for a business user?

A. Virtual PBX
B. Virtual switch
C. Virtual desktop
D. Virtual SAN


Answer: C. Virtual desktop

Computer Science & Information Technology

You might also like to view...

The symbols found on hierarchy charts include:

a. rectangles b. squares c. line segments d. shaded triangles e. all of the above. f. a, c, and d.

Computer Science & Information Technology

Wi-Fi ________ are wireless access points that are available in many public locations

Fill in the blank(s) with correct word

Computer Science & Information Technology

To set a tab on the horizontal ruler bar, click the ____________________  to select the type of tab to be set on the ruler.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is one way the user can tell that records cannot be deleted in a form?

A. The Delete command is not visible. B. The Delete command has a line through it. C. The Delete command is grayed out. D. There is no way to tell if records cannot be deleted.

Computer Science & Information Technology