List three methods for keeping a virtual machine secured.

What will be an ideal response?

For a Windows VM, be sure to configure Windows Firewall in the VM, keep Windows updates current, install and run antivirus software, require passwords for all user accounts in the VM, and encrypt data folders. One major advantage of using VMs on a desktop computer is that VMs running under a Type 1 hypervisor are isolated from each other. If one VM gets infected, the other VMs will not be affected. You can move a VM from one computer to another by moving the files that contain the VM. Be sure these files that hold the VM are secured with permissions that allow access only to specific local or network users. Protect your VMs by applying security measures to protect the host computer that holds the VMs. For example, require password authentication to sign in to the host computer.

Computer Science & Information Technology

You might also like to view...

Spaces in a Web folder or file name might be replaced with the ________ combination

Fill in the blank(s) with correct word

Computer Science & Information Technology

For each service call the technician should be equipped with

A) Pen, pencil, and notepad B) Basic tools C) Good attitude D) All these answers are important for a technician to have.

Computer Science & Information Technology