subject

A technician is using a network-attached desktop computer with a Type 2 hypervisor to run two VMs. One of the VMs is infected with multiple worms and other forms of known malware. The second VM is a clean installation of Windows. The technician has been tasked with logging the impact on the clean Windows VM when the infected VM attempts to infiltrate the clean VM through the network.
What should the technician do to best protect the company LAN while performing these tests?
a. Place both VMs on virtual NICs that are isolated from the company LAN.
b. Disable the virtual network interface controller in each VM OS.
c. Encrypt each VM and the host OS using disk-based encryption.
d. Enable the software firewalls on each VM OS and on the host OS.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 21:30
You need to write some code that responds to a text change in a jtextfield. how can you do that? create a class that implements the interface actionlistener and override the method textfieldchanged create a class that extends the superclass actionlistener and override the method actionperformed create a class that implements the interface actionlistener and override the method actionperformed create a class that extends the superclass actionlistener and override the method textfieldchanged
Answers: 2
question
Computers and Technology, 22.06.2019 17:00
Aisha has finished working on a word processing document that contains 15 pages. she has added some special elements in the first three pages, page 9 and 10, and page 15 from the document. she wants to print only these pages to see how they look. which option is the correct way to represent (in the print dialog box) the pages that aisha wants to print
Answers: 3
question
Computers and Technology, 23.06.2019 20:50
3.11.3 quiz: comparing and analyzing function typesquestion 4 of 102 pointswhat can you say about the y-values of the two functions f(x) = 3x2-3 andg(x)=2* - 3?
Answers: 2
question
Computers and Technology, 25.06.2019 05:30
When a game allows you to pick party members from a large pool, each with different classes and roles but in which no single party combination is clearly superior to others, the game is using: intransitive relationships transitive relationships orthogonal relationships parallel relationships
Answers: 1
You know the right answer?
A technician is using a network-attached desktop computer with a Type 2 hypervisor to run two VMs. O...
Questions
question
Mathematics, 06.05.2020 02:46
question
Mathematics, 06.05.2020 02:46