What must you do after you install Hyper-V to ensure that it is secure?

A. block all incoming ports
B. configure updates
C. require biometric authentication
D. use IPsec with all VMs

Answer: B

Computer Science & Information Technology

You might also like to view...

________ is available for many galleries and shows how formatting will look before it is applied

A) Live Preview B) Peek C) Gallery option D) Backstage view

Computer Science & Information Technology

Which term is used when an event triggers an IDS alert, but the event was not malicious?

A. False positive B. True negative C. False negative D. True positive

Computer Science & Information Technology