Buy Application Of Virtualization Technology
Buy Application Of Virtualization Technology
1. Which of the following is an inherent security risk in using virtual
machines?
❍ A. The BIOS can easily be compromised.
❍ B. The boot order can be easily changed.
❍ C. Security measures are nonexistent.
❍ D. The entire machine can be compromised.
2. Which of the following would be the most effective method to protect a virtual environment hosting medical data?
❍ A. Using segmented physical hardware for the virtual
servers
❍ B. Using shared physical hardware with virtual machines
for testing
❍ C. Using segmented physical hardware for each virtual
server
❍ D. Using shared physical hardware with virtual machines
for web applications
3. Which of the following are appropriate reasons to use virtualized
environments? (Select all correct answers.)
❍ A. Reduces threat risk
❍ B. Allows isolation of applications
❍ C. Reduces equipment costs
❍ D. Allows environments on USB devices
4. Which of the following controls how access to a computer’s
processors and memory is shared in a virtual environment?
❍ A. BIOS
❍ B. Hypervisor
❍ C. Operating system
❍ D. Virtual machine applications
Quick Check ✓
Quick Answer: 43
Detailed Answer: 68
Quick Answer: 43
Detailed Answer: 68
Quick Answer: 43
Detailed Answer: 68
Quick Answer: 43
Detailed Answer: 68
Domain 1.0: Systems Security 37
5. In which of the following ways would a forensic analyst mostly
likely use a virtual environment? (Select all correct answers.)
❍ A. To view the environment the same way the criminal
did
❍ B. To load multiple cases at once
❍ C. To image hard drives and removable media
❍ D. To examine environments that may contain malware
6. Which of the following is true in regard to a compromised virtual
machine environment?
❍ A. It is contained in its own environment.
❍ B. It can provide access to the network.
❍ C. Any threat can easily be addressed by deletion.
❍ D. It can be replaced by a backup copy immediately.
7. Which of the following is true about virtual machine environments? (Select all correct answers.)
❍ A. They are susceptible to the same issues as a host
operating system.
❍ B. They do not need antivirus or malware protection.
❍ C. They need to be patched just like host environments.
❍ D. They are contained environments that do not need
patching.
8. In which of the following areas should the vulnerabilities of existing virtual environments be addressed?
❍ A. Change management policy
❍ B. Business continuity plan
❍ C. Organizational security policy
❍ D. Disaster recovery plan
9. Which of the following are areas where virtual environments can
be used to improve security? (Select all correct answers.)
❍ A. Scanning for malicious software
❍ B. Reducing internal data aggregation
❍ C. Allowing unstable applications to be isolated
❍ D. Providing better disaster recovery solutions
Quick Answer:
Quick Check ✓
43
Detailed Answer: 68
Quick Answer: 43
Detailed Answer: 68
Quick Answer: 43
Detailed Answer: 69
Quick Answer: 43
Detailed Answer: 69
Quick Answer: 43
Detailed Answer: 69
38 Chapter 1
10. Which of the following is the most effective method to reduce
server power consumption?
❍ A. Replacing older servers with newer low wattage
servers
❍ B. Combining all physical hardware into one virtualized
server
❍ C. Using segmented physical hardware for like-kind
servers
❍ D. Using shared physical hardware for all virtual servers
Having a hard time figuring out how to do your assignment?
Ask our experts for help and get it done in no time!
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more