Virtual hosts with different security requirements should be:
A.
encrypted with a one-time password.
B.
stored on separate physical hosts.
C.
moved to the cloud.
D.
scanned for vulnerabilities regularly.
Virtual hosts with different security requirements should be:
Virtual hosts with different security requirements should be:
A.
encrypted with a one-time password.
B.
stored on separate physical hosts.
C.
moved to the cloud.
D.
scanned for vulnerabilities regularly.