2.5 Virtual Networking Part 5
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Course
Difficulty
Beginner
Video Transcription
00:04
that's, uh,
00:12
yeah.
00:16
So it's all about the security and not letting people access that data that you're dealing with. Its one word. I've kept it nice and simple. Don't overthink it. Have a kind of guess. You probably shouting out a few answers.
00:31
You can talk to me the chat if you want. Actually, I don't consider that. Type them in the chapel is, well, you have a go.
00:36
But effectively, the answer to this one would be encryption. It's used to create keys, which allow you to encrypt data hardware, connections to software, everything else in between.
00:47
Primarily it's used to prove that the machine is what and who it says it is. So that's kind of where they used a za primary function secondary. You can actually use it to an incorrect fight
01:02
question, too.
01:03
Let's have a look at this one. So what Windows firewall settings do you initially
01:08
need to configure?
01:11
Initially?
01:14
You ever think about it? So we had to. It's just one slight. They're they're fairly easy, like it's not a huge thing.
01:22
Uh, the answer for this one
01:23
would be none. Actually. Initially, you don't need to configure it, because when you install it, and if the firewall is in place, it's just going to configure it itself. Thean installation of hyper V does it for you. It's really nice. Microsoft have made it very nice and easy. You only need to get involved if you're going to go for something
01:42
at a higher level
01:44
on this one, so that keeps it nice and simple. One final question for this one.
01:49
When should you use a Gentoo virtual machine? We've discussed this a little bit.
01:53
I won't wait too long on this one because this was this was a fairly hefty one. I thought we covered. But there's a sit Certain
02:00
situation,
02:02
big situation, actually where you would use a gentle machine,
02:07
Anyone
02:09
whenever possible.
02:10
If you don't need Jen, one
02:14
pick Jen to every single time. It is so much faster. You can actually visibly if you have a general machine on a Gentoo machine and you turned them on at the same time,
02:24
you can visibly see a huge difference between the General and Jen to the Shia speed difference is nuts.
02:32
So I always go for a Gentoo whenever possible, only use a genuine one machine when generation to doesn't support the operating system. You want to run on the virtual machine or doesn't support the boot method? You want to use the most common one being pixie. If you're looking to boot into the pre boom execution environment,
02:52
maybe you want to image the machine,
02:54
you would have to use Gem one for the moment.
02:58
All right, so
02:59
covering what we discussed in this one, we're gonna be We've discussed Sorry. Understanding the security settings within hyper V
03:06
on. We've also covered understanding firewall settings in general on how to get my curvy working with that efficiently. So what we gonna do?
Up Next
2.6 Virtual Networking Part 6
2.7 Virtual Networking Part 7
2.8 Virtual Networking Part 8
2.9 Virtual Networking Part 9
2.10 Virtual Networking Part 10
Similar Content