Which of the following is NOT a guideline for handling legacy applications?

A. Limit physical access to the legacy applications to administrators.
B. If possible, deploy legacy applications on a physical machine.
C. Employ access control lists (ACLs) to protect the data on the system.
D. Deploy the highest level authentication and encryption mechanisms as possible.

B
Explanation: If possible, deploy legacy applications on a virtual machine.

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT a rule for appending queries?

A) A field from the source table does not exist in the destination table. B) Data field types do not have to be the same. C) All the normal rules for adding a new record to the destination table apply. D) The destination table should not contain an AutoNumber field.

Computer Science & Information Technology

The CPOE component of a health information system is used primarily by _______

a. Doctors b. Nurses c. Clericals d. None of the above

Computer Science & Information Technology