How should you protect each virtual machine?

You plan to deploy three encrypted virtual machines that use Secure Boot. The virtual machines will be
configured as shown in the following table:

How should you protect each virtual machine? Choose Three.

You plan to deploy three encrypted virtual machines that use Secure Boot. The virtual machines will be
configured as shown in the following table:

How should you protect each virtual machine? Choose Three.

A.
VM1: An encryption-supported virtual machine

B.
VM1: A shielded virtual machine

C.
VM2: An encryption-supported virtual machine

D.
VM2: A shielded virtual machine

E.
VM3: An encryption-supported virtual machine

F.
VM3: A shielded virtual machine

Explanation:
Shielded VM Prevents Virtual Machine connection and PowerShell Direct, it prevent the Hyper-V host to interact
in any means with the Shielded VM.
https://docs.microsoft.com/en-us/windows-server/virtualization/guarded-fabric-shielded-vm/guarded-fabric-andshielded-vms



Leave a Reply 0

Your email address will not be published. Required fields are marked *