Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Case Study 3-2: Securing a Virtual Machine Scenario: Now that you have installed

ID: 3850930 • Letter: C

Question

Case Study 3-2: Securing a Virtual Machine Scenario: Now that you have installed virtual machine software, and created a new VM, yo are required to secure it. Your task is to disable unnecessary virtual hardware and secure the virtual BIOS. Virtual machines that are contained within a Type 2 host are sort of like a computer within a com puter. Consider writing down exactly what you are configuring. Try to do this an nature. Or, consider using a network documentation program such as Visio. As you progress in the virtual world, you will be using more and more virtual computers, and will connect to them in a

Explanation / Answer

Securing the Virtual Machine:

As in the question above you have stated some of the good security methods to keep a VM machine secured.It basically consists all the things about the BIOS security which is been most of the times neglected which must not be done because BIOS hacking is one of the major reasons of corporate hacks and many a time companies neglect this phase of security. But, it was good to see you considering this security and all the points are been written successfully. I will lead this case study further. Hence , read below to learn about more security measures that must be taken in order to protect a virtual machine.

Hence, these are the security steps that must be taken in order to enable the security of the virtual machine and increasing the security in order to keep the VM secure.

Please rate the answer if it helped.....Thankyou

Hope it helps.....

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote