A technician is using a network-attached desktop computer with a Type 2 hypervisor to run two VMs. One of the VMs is infected with multiple worms and other forms of known malware. The second VM is a clean installation of Windows. The technician has been tasked with logging the impact on the clean Windows VM when the infected VM attempts to infiltrate the clean VM through the network.
 
What should the technician do to best protect the company LAN while performing these tests?

A. Encrypt each VM and the host OS using disk-based encryption.
B. Enable the software firewalls on each VM OS and on the host OS.
C. Place both VMs on virtual NICs that are isolated from the company LAN.
D. Disable the virtual network interface controller in each VM OS.


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following statements for a JTextField is false?

a. Can be used to display uneditable text. b. Can be used to display editable text. c. Enables users to enter data from the keyboard. d. Displays a list of fields.

Computer Science & Information Technology

A double-layer BD has the greatest capacity of optical discs

Indicate whether the statement is true or false

Computer Science & Information Technology

Remarks or text that documents or explains what a section of VBA code does are known as ________

A) keywords B) comments C) procedures D) statements

Computer Science & Information Technology

Which of the following is an example of an operating system?

A. C++ B. C# C. Windows D. Visual Basic

Computer Science & Information Technology