Which of the following is NOT a security concern presented by virtualized storage?

A. The additional layers of technology required by virtual storage increases management overhead by necessitating additional points at which to apply security controls.
B. There are challenges involved in managing large numbers of virtual instances and snapshots.
C. There is a potential loss of visibility into the guest operating systems and the network traffic in the virtualized environment.
D. There is an inability to control access through authentication.

D
Explanation: While all of the other options are valid concerns, controlling access through authentication is not. It is possible to control access through authentication.

Computer Science & Information Technology

You might also like to view...

When using a text string in an argument, enclose the string in ________ so Excel will recognize it as a text string rather than a named range

A) asterisks * * B) parentheses ( ) C) quotes " " D) brackets [ ]

Computer Science & Information Technology

Android requires the user’s permission to allow an app to save files. In Android 6.0, the app ________.

a. prompts the user at installation time with a complete list of permissions the app requires. b. prompts the user at installation time and execution time with a complete list of permissions the app requires. c. requests each permission individually at execution time, only when the permission is required to perform a given task for the first time. d. None of the above.

Computer Science & Information Technology