Application Of Virtualization Technology

Application Of Virtualization Technology
Application Of Virtualization Technology
1. Which of the following is an inherent security risk in using virtual
machines?
❍ A. The BIOS can easily be compromised.
❍ B. The boot order can be easily changed.
❍ C. Security measures are nonexistent.
❍ D. The entire machine can be compromised.
2. Which of the following would be the most effective method to protect a virtual environment hosting medical data?
❍ A. Using segmented physical hardware for the virtual
servers
❍ B. Using shared physical hardware with virtual machines
for testing
❍ C. Using segmented physical hardware for each virtual
server
❍ D. Using shared physical hardware with virtual machines
for web applications
3. Which of the following are appropriate reasons to use virtualized
environments? (Select all correct answers.)
❍ A. Reduces threat risk
❍ B. Allows isolation of applications
❍ C. Reduces equipment costs
❍ D. Allows environments on USB devices
4. Which of the following controls how access to a computer’s
processors and memory is shared in a virtual environment?
❍ A. BIOS
❍ B. Hypervisor
❍ C. Operating system
❍ D. Virtual machine applications
Quick Check ✓
Quick Answer: 43
Detailed Answer: 68
Quick Answer: 43
Detailed Answer: 68
Quick Answer: 43
Detailed Answer: 68
Quick Answer: 43
Detailed Answer: 68
Domain 1.0: Systems Security 37
5. In which of the following ways would a forensic analyst mostly
likely use a virtual environment? (Select all correct answers.)
❍ A. To view the environment the same way the criminal
did
❍ B. To load multiple cases at once
❍ C. To image hard drives and removable media
❍ D. To examine environments that may contain malware
6. Which of the following is true in regard to a compromised virtual
machine environment?
❍ A. It is contained in its own environment.
❍ B. It can provide access to the network.
❍ C. Any threat can easily be addressed by deletion.
❍ D. It can be replaced by a backup copy immediately.
7. Which of the following is true about virtual machine environments? (Select all correct answers.)
❍ A. They are susceptible to the same issues as a host
operating system.
❍ B. They do not need antivirus or malware protection.
❍ C. They need to be patched just like host environments.
❍ D. They are contained environments that do not need
patching.
8. In which of the following areas should the vulnerabilities of existing virtual environments be addressed?
❍ A. Change management policy
❍ B. Business continuity plan
❍ C. Organizational security policy
❍ D. Disaster recovery plan
9. Which of the following are areas where virtual environments can
be used to improve security? (Select all correct answers.)
❍ A. Scanning for malicious software
❍ B. Reducing internal data aggregation
❍ C. Allowing unstable applications to be isolated
❍ D. Providing better disaster recovery solutions
Quick Answer:
Quick Check ✓
43
Detailed Answer: 68
Quick Answer: 43
Detailed Answer: 68
Quick Answer: 43
Detailed Answer: 69
Quick Answer: 43
Detailed Answer: 69
Quick Answer: 43
Detailed Answer: 69
38 Chapter 1
10. Which of the following is the most effective method to reduce
server power consumption?
❍ A. Replacing older servers with newer low wattage
servers
❍ B. Combining all physical hardware into one virtualized
server
❍ C. Using segmented physical hardware for like-kind
servers
❍ D. Using shared physical hardware for all virtual servers

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 30% with the discount code HAPPY