Which of the following is NOT a guideline for handling legacy applications?
A. Limit physical access to the legacy applications to administrators.
B. If possible, deploy legacy applications on a physical machine.
C. Employ access control lists (ACLs) to protect the data on the system.
D. Deploy the highest level authentication and encryption mechanisms as possible.
B
Explanation: If possible, deploy legacy applications on a virtual machine.
You might also like to view...
Which of the following is NOT a rule for appending queries?
A) A field from the source table does not exist in the destination table. B) Data field types do not have to be the same. C) All the normal rules for adding a new record to the destination table apply. D) The destination table should not contain an AutoNumber field.
The CPOE component of a health information system is used primarily by _______
a. Doctors b. Nurses c. Clericals d. None of the above