Question: I need help with this question Fareeda, a system administrator, is configuring the security settings for a Generation 2 virtual machine called VMI. She enables
I need help with this question




Fareeda, a system administrator, is configuring the security settings for a Generation 2 virtual machine called VMI. She enables the Trusted Platform Module (TPM). Next, she wants to encrypt the virtual hard disks for VMI so that other virtual machines are restricted from using these hard disks. If the virtual hard disks are successfully encrypted, which of the following statements must be true? a) Secure Boot is disabled by default in Generation 2 virtual machines. b) Fareeda enabled shielding in the security settings for VMI. c) Fareeda selected the option to Encrypt state and virtual machine traffic. d) BitLocker contains the encryption keys. Freya notices some performance issues with an important Generation 2 virtual machine. She realizes that the issue is caused by the presence of other virtual hard disks on the same physical disk. She has another physical hard disk on her system that is currently underutilized. She decides to use this disk as a pass-through disk to enhance the performance of the virtual machine. If Freya was able to accomplish this task successfully, which of the following must be true? Freya deleted the virtual disk from her system Ob) Freya changed the physical disk's settings to take it offline c) Freya removed the virtual hard drive from the virtual machine. Freya used the Browse option under the virtual hard drive settings Huong is the system administrator for a virtual machine that is used by over 500 employees. She wants to install some device drivers to enable support for a few hardware components. Before she installs the drivers, she wants to ensure that she can revert to the current version of the virtual machine if something goes wrong with the installation. Which of the following Hyper-V features should Huong use? O a) Replication b) Nested virtualization Oc) Live migration Od) Checkpoints
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
