Which of the following is NOT a security concern presented by virtualized storage?
A. The additional layers of technology required by virtual storage increases management overhead by necessitating additional points at which to apply security controls.
B. There are challenges involved in managing large numbers of virtual instances and snapshots.
C. There is a potential loss of visibility into the guest operating systems and the network traffic in the virtualized environment.
D. There is an inability to control access through authentication.
D
Explanation: While all of the other options are valid concerns, controlling access through authentication is not. It is possible to control access through authentication.
You might also like to view...
Explain how the mechanism for deciding which catch block catches an exception is like the mechanism for deciding which function definition is used when an overloaded function is called.
What will be an ideal response?
Case-Based Critical Thinking QuestionsCase 7-2Kyra is quizzing her friend Leon about the various options available in CSS to direct parts of the Web page to different output devices, in preparation for his test tomorrow.Kyra asks Leon how she can view a likeness of the print style. What is his answer?
A. Print the page. B. Use the print preview feature in the browser. C. Use the set print options feature. D. all of the above
The ___________ replaces the system recovery disc in Windows 8 and 8.1 and contains all the Windows files that are necessary to restore Windows from a hardware failure
a. DVD Recovery Disc b. USB recovery drive c. Network restore point d. None of the above
Which issue occurs when a web browser is sent data without proper validation?
A. Insecure direct object access (IDOA) B. Cross-site request forgery (CSRF) C. Cross-site scripting (XXS) D. Lightweight directory access protocol (LDAP) injection