Deck 7: Windows 7 Security Features

ملء الشاشة (f)
exit full mode
سؤال
NTFS permissions can be easily circumvented when you have physical access to a computer.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
____ is(are) used to define which programs are allowed or disallowed in the system.

A) Software restriction policies
B) A network zone
C) Local policies
D) AppLocker
سؤال
____ is software that is silently installed on your computer, monitors your behavior, and performs actions based on your behavior.

A) Adware
B) Worm
C) Spyware
D) Virus
سؤال
The most critical effect of malware is degraded system performance.
سؤال
A(n) ____ computer is one that has outdated antivirus signatures or is missing security updates.

A) unhealthy
B) healthy
C) safe
D) authorized
سؤال
____ is a threat to privacy and often makes systems unstable.

A) Windows Defender
B) EFS
C) Macro script
D) Spyware
سؤال
A(n) ____ policy controls password characteristics for local user accounts.

A) account lockout
B) password
C) domain
D) user control
سؤال
____ is the security process that records the occurrence of specific operating system events in the Security log.

A) Encrypting
B) Hashing
C) Filtering
D) Auditing
سؤال
Newer Windows applications use an application ____ to describe the structure of an application.

A) manifest
B) log
C) record
D) hash
سؤال
Every object in Windows 7 has audit events related to it.
سؤال
While ____ is a great source of information, it is also the biggest source of malware (malicious software).

A) the Internet
B) a cloud library
C) a hard disk
D) a router
سؤال
In Windows 7, advanced audit policies can only be edited at a command-line.
سؤال
Windows 7 includes a(n) ____ policy, which can be used to control many facets of Windows.

A) NAP
B) local security
C) EFS security
D) remote
سؤال
A ____ rule condition identifies software by file location. You can specify a single file or a folder path from which software can be run.

A) network zone
B) path
C) hash
D) certificate
سؤال
Audit ____ tracks when tasks are performed that require a user rights assignment, such as changing the system time.

A) logon events
B) account management
C) privilege use
D) process tracking
سؤال
The most commonly used method for authentication is a username and password.
سؤال
You can eliminate an error generated by Applications that are not designed for Windows 7 and which require administrative privileges by using the ____.

A) Administrative Privileges Toolkit
B) Private Toolkit
C) Secure Toolkit
D) Application Compatibility Toolkit
سؤال
Using the ____ policy, you can configure an account to be temporarily disabled after a number of incorrect log-on attempts.

A) domain
B) group
C) account lockout
D) password
سؤال
To address the risks to data stored on workstations and laptops, ____ is available on Windows 7.

A) NAP
B) Dual Locked Hard Drive
C) BitLocker Drive Encryption
D) TPM
سؤال
The local security policy is part of a larger Windows management system called ____, which can be implemented on a local computer, but is typically part of a domain-based network.

A) Group Policy
B) Local Policy
C) Network Policy
D) Domain Policy
سؤال
A(n) ____ encryption algorithm uses two keys to encrypt and decrypt data.

A) signing
B) symmetric
C) asymmetric
D) hash
سؤال
What are the most common reasons that the BitLocker Drive Encryption recovery password is required?
سؤال
The most basic level of data security in Windows 7 is ____ permissions.

A) EFS
B) NTFS
C) FAT
D) NAP
سؤال
A(n) ____ encryption algorithm uses the same key to encrypt data and decrypt data.

A) asymmetric
B) symmetric
C) signing
D) hash
سؤال
What are the major security improvements in Windows 7?
سؤال
The Account Policies category contains the ____________________ policy and the account lockout policy.
سؤال
What are the tasks you can perform with the Security Configuration and Analysis tool?
سؤال
What are the settings available to control account lockouts?
سؤال
What are some of the settings available in the security options of the local policy?
سؤال
A(n) ____ is part of the motherboard in your computer and is used to store encryption keys and certificates.

A) NTFS
B) TPM
C) EFS
D) NAP
سؤال
Windows 7 is protected on networks by an enhanced firewall and ___________________________________.
سؤال
____________________ are .inf files that contain settings that correspond with the Account Policies and Local Policies in the local security policy.
سؤال
What are some of the settings available in the user rights assignment?
سؤال
Briefly describe the rule collections used by AppLocker.
سؤال
____ is the process of taking data and making it unreadable.

A) Encryption
B) Decryption
C) Signing
D) Verifying
سؤال
A(n) ____ encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted.

A) signing
B) symmetric
C) asymmetric
D) hash
سؤال
Internet Explorer has been modified to run in a limited state, called ____________________ mode, in which user files cannot be modified.
سؤال
What are the categories of local security policy settings?
سؤال
Briefly describe the changes in Windows services that have been made to harden them.
سؤال
____________________ is a method for protecting data on removable storage such as USB drives.
سؤال
Match between columns
prevents unhealthy computers from accessing the network
Phishing filter
prevents unhealthy computers from accessing the network
Password Policy
prevents unhealthy computers from accessing the network
Malware
prevents unhealthy computers from accessing the network
Windows Defender
prevents unhealthy computers from accessing the network
Auditing
prevents unhealthy computers from accessing the network
BitLocker Drive Encryption
prevents unhealthy computers from accessing the network
Network Access Protection (NAP)
prevents unhealthy computers from accessing the network
Path rule condition
prevents unhealthy computers from accessing the network
User Account Control (UAC)
encrypts the entire volume of a partition and protects the system partition
Phishing filter
encrypts the entire volume of a partition and protects the system partition
Password Policy
encrypts the entire volume of a partition and protects the system partition
Malware
encrypts the entire volume of a partition and protects the system partition
Windows Defender
encrypts the entire volume of a partition and protects the system partition
Auditing
encrypts the entire volume of a partition and protects the system partition
BitLocker Drive Encryption
encrypts the entire volume of a partition and protects the system partition
Network Access Protection (NAP)
encrypts the entire volume of a partition and protects the system partition
Path rule condition
encrypts the entire volume of a partition and protects the system partition
User Account Control (UAC)
controls password characteristics for local user accounts.
Phishing filter
controls password characteristics for local user accounts.
Password Policy
controls password characteristics for local user accounts.
Malware
controls password characteristics for local user accounts.
Windows Defender
controls password characteristics for local user accounts.
Auditing
controls password characteristics for local user accounts.
BitLocker Drive Encryption
controls password characteristics for local user accounts.
Network Access Protection (NAP)
controls password characteristics for local user accounts.
Path rule condition
controls password characteristics for local user accounts.
User Account Control (UAC)
prompts administrative user if an administrative action is initiated by a program
Phishing filter
prompts administrative user if an administrative action is initiated by a program
Password Policy
prompts administrative user if an administrative action is initiated by a program
Malware
prompts administrative user if an administrative action is initiated by a program
Windows Defender
prompts administrative user if an administrative action is initiated by a program
Auditing
prompts administrative user if an administrative action is initiated by a program
BitLocker Drive Encryption
prompts administrative user if an administrative action is initiated by a program
Network Access Protection (NAP)
prompts administrative user if an administrative action is initiated by a program
Path rule condition
prompts administrative user if an administrative action is initiated by a program
User Account Control (UAC)
a real-time spyware monitor to prevent the installation of and remove spyware
Phishing filter
a real-time spyware monitor to prevent the installation of and remove spyware
Password Policy
a real-time spyware monitor to prevent the installation of and remove spyware
Malware
a real-time spyware monitor to prevent the installation of and remove spyware
Windows Defender
a real-time spyware monitor to prevent the installation of and remove spyware
Auditing
a real-time spyware monitor to prevent the installation of and remove spyware
BitLocker Drive Encryption
a real-time spyware monitor to prevent the installation of and remove spyware
Network Access Protection (NAP)
a real-time spyware monitor to prevent the installation of and remove spyware
Path rule condition
a real-time spyware monitor to prevent the installation of and remove spyware
User Account Control (UAC)
lets you track when users log on and which resources are used
Phishing filter
lets you track when users log on and which resources are used
Password Policy
lets you track when users log on and which resources are used
Malware
lets you track when users log on and which resources are used
Windows Defender
lets you track when users log on and which resources are used
Auditing
lets you track when users log on and which resources are used
BitLocker Drive Encryption
lets you track when users log on and which resources are used
Network Access Protection (NAP)
lets you track when users log on and which resources are used
Path rule condition
lets you track when users log on and which resources are used
User Account Control (UAC)
malicious software designed to perform unauthorized acts on your computer
Phishing filter
malicious software designed to perform unauthorized acts on your computer
Password Policy
malicious software designed to perform unauthorized acts on your computer
Malware
malicious software designed to perform unauthorized acts on your computer
Windows Defender
malicious software designed to perform unauthorized acts on your computer
Auditing
malicious software designed to perform unauthorized acts on your computer
BitLocker Drive Encryption
malicious software designed to perform unauthorized acts on your computer
Network Access Protection (NAP)
malicious software designed to perform unauthorized acts on your computer
Path rule condition
malicious software designed to perform unauthorized acts on your computer
User Account Control (UAC)
prevents unauthorized Web sites from stealing log-on credentials and other personal information
Phishing filter
prevents unauthorized Web sites from stealing log-on credentials and other personal information
Password Policy
prevents unauthorized Web sites from stealing log-on credentials and other personal information
Malware
prevents unauthorized Web sites from stealing log-on credentials and other personal information
Windows Defender
prevents unauthorized Web sites from stealing log-on credentials and other personal information
Auditing
prevents unauthorized Web sites from stealing log-on credentials and other personal information
BitLocker Drive Encryption
prevents unauthorized Web sites from stealing log-on credentials and other personal information
Network Access Protection (NAP)
prevents unauthorized Web sites from stealing log-on credentials and other personal information
Path rule condition
prevents unauthorized Web sites from stealing log-on credentials and other personal information
User Account Control (UAC)
identifies software by file location
Phishing filter
identifies software by file location
Password Policy
identifies software by file location
Malware
identifies software by file location
Windows Defender
identifies software by file location
Auditing
identifies software by file location
BitLocker Drive Encryption
identifies software by file location
Network Access Protection (NAP)
identifies software by file location
Path rule condition
identifies software by file location
User Account Control (UAC)
سؤال
What are the security settings monitored by Action Center?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Windows 7 Security Features
1
NTFS permissions can be easily circumvented when you have physical access to a computer.
True
2
____ is(are) used to define which programs are allowed or disallowed in the system.

A) Software restriction policies
B) A network zone
C) Local policies
D) AppLocker
D
3
____ is software that is silently installed on your computer, monitors your behavior, and performs actions based on your behavior.

A) Adware
B) Worm
C) Spyware
D) Virus
C
4
The most critical effect of malware is degraded system performance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
A(n) ____ computer is one that has outdated antivirus signatures or is missing security updates.

A) unhealthy
B) healthy
C) safe
D) authorized
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
____ is a threat to privacy and often makes systems unstable.

A) Windows Defender
B) EFS
C) Macro script
D) Spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
A(n) ____ policy controls password characteristics for local user accounts.

A) account lockout
B) password
C) domain
D) user control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
____ is the security process that records the occurrence of specific operating system events in the Security log.

A) Encrypting
B) Hashing
C) Filtering
D) Auditing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
Newer Windows applications use an application ____ to describe the structure of an application.

A) manifest
B) log
C) record
D) hash
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
Every object in Windows 7 has audit events related to it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
While ____ is a great source of information, it is also the biggest source of malware (malicious software).

A) the Internet
B) a cloud library
C) a hard disk
D) a router
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
In Windows 7, advanced audit policies can only be edited at a command-line.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
Windows 7 includes a(n) ____ policy, which can be used to control many facets of Windows.

A) NAP
B) local security
C) EFS security
D) remote
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
A ____ rule condition identifies software by file location. You can specify a single file or a folder path from which software can be run.

A) network zone
B) path
C) hash
D) certificate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
Audit ____ tracks when tasks are performed that require a user rights assignment, such as changing the system time.

A) logon events
B) account management
C) privilege use
D) process tracking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
The most commonly used method for authentication is a username and password.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
You can eliminate an error generated by Applications that are not designed for Windows 7 and which require administrative privileges by using the ____.

A) Administrative Privileges Toolkit
B) Private Toolkit
C) Secure Toolkit
D) Application Compatibility Toolkit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
Using the ____ policy, you can configure an account to be temporarily disabled after a number of incorrect log-on attempts.

A) domain
B) group
C) account lockout
D) password
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
To address the risks to data stored on workstations and laptops, ____ is available on Windows 7.

A) NAP
B) Dual Locked Hard Drive
C) BitLocker Drive Encryption
D) TPM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
The local security policy is part of a larger Windows management system called ____, which can be implemented on a local computer, but is typically part of a domain-based network.

A) Group Policy
B) Local Policy
C) Network Policy
D) Domain Policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
A(n) ____ encryption algorithm uses two keys to encrypt and decrypt data.

A) signing
B) symmetric
C) asymmetric
D) hash
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
What are the most common reasons that the BitLocker Drive Encryption recovery password is required?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
The most basic level of data security in Windows 7 is ____ permissions.

A) EFS
B) NTFS
C) FAT
D) NAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
A(n) ____ encryption algorithm uses the same key to encrypt data and decrypt data.

A) asymmetric
B) symmetric
C) signing
D) hash
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
What are the major security improvements in Windows 7?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
The Account Policies category contains the ____________________ policy and the account lockout policy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
What are the tasks you can perform with the Security Configuration and Analysis tool?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
What are the settings available to control account lockouts?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
What are some of the settings available in the security options of the local policy?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
A(n) ____ is part of the motherboard in your computer and is used to store encryption keys and certificates.

A) NTFS
B) TPM
C) EFS
D) NAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
Windows 7 is protected on networks by an enhanced firewall and ___________________________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
____________________ are .inf files that contain settings that correspond with the Account Policies and Local Policies in the local security policy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
What are some of the settings available in the user rights assignment?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
Briefly describe the rule collections used by AppLocker.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
____ is the process of taking data and making it unreadable.

A) Encryption
B) Decryption
C) Signing
D) Verifying
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
A(n) ____ encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted.

A) signing
B) symmetric
C) asymmetric
D) hash
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
Internet Explorer has been modified to run in a limited state, called ____________________ mode, in which user files cannot be modified.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
What are the categories of local security policy settings?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
Briefly describe the changes in Windows services that have been made to harden them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
____________________ is a method for protecting data on removable storage such as USB drives.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
prevents unhealthy computers from accessing the network
Phishing filter
prevents unhealthy computers from accessing the network
Password Policy
prevents unhealthy computers from accessing the network
Malware
prevents unhealthy computers from accessing the network
Windows Defender
prevents unhealthy computers from accessing the network
Auditing
prevents unhealthy computers from accessing the network
BitLocker Drive Encryption
prevents unhealthy computers from accessing the network
Network Access Protection (NAP)
prevents unhealthy computers from accessing the network
Path rule condition
prevents unhealthy computers from accessing the network
User Account Control (UAC)
encrypts the entire volume of a partition and protects the system partition
Phishing filter
encrypts the entire volume of a partition and protects the system partition
Password Policy
encrypts the entire volume of a partition and protects the system partition
Malware
encrypts the entire volume of a partition and protects the system partition
Windows Defender
encrypts the entire volume of a partition and protects the system partition
Auditing
encrypts the entire volume of a partition and protects the system partition
BitLocker Drive Encryption
encrypts the entire volume of a partition and protects the system partition
Network Access Protection (NAP)
encrypts the entire volume of a partition and protects the system partition
Path rule condition
encrypts the entire volume of a partition and protects the system partition
User Account Control (UAC)
controls password characteristics for local user accounts.
Phishing filter
controls password characteristics for local user accounts.
Password Policy
controls password characteristics for local user accounts.
Malware
controls password characteristics for local user accounts.
Windows Defender
controls password characteristics for local user accounts.
Auditing
controls password characteristics for local user accounts.
BitLocker Drive Encryption
controls password characteristics for local user accounts.
Network Access Protection (NAP)
controls password characteristics for local user accounts.
Path rule condition
controls password characteristics for local user accounts.
User Account Control (UAC)
prompts administrative user if an administrative action is initiated by a program
Phishing filter
prompts administrative user if an administrative action is initiated by a program
Password Policy
prompts administrative user if an administrative action is initiated by a program
Malware
prompts administrative user if an administrative action is initiated by a program
Windows Defender
prompts administrative user if an administrative action is initiated by a program
Auditing
prompts administrative user if an administrative action is initiated by a program
BitLocker Drive Encryption
prompts administrative user if an administrative action is initiated by a program
Network Access Protection (NAP)
prompts administrative user if an administrative action is initiated by a program
Path rule condition
prompts administrative user if an administrative action is initiated by a program
User Account Control (UAC)
a real-time spyware monitor to prevent the installation of and remove spyware
Phishing filter
a real-time spyware monitor to prevent the installation of and remove spyware
Password Policy
a real-time spyware monitor to prevent the installation of and remove spyware
Malware
a real-time spyware monitor to prevent the installation of and remove spyware
Windows Defender
a real-time spyware monitor to prevent the installation of and remove spyware
Auditing
a real-time spyware monitor to prevent the installation of and remove spyware
BitLocker Drive Encryption
a real-time spyware monitor to prevent the installation of and remove spyware
Network Access Protection (NAP)
a real-time spyware monitor to prevent the installation of and remove spyware
Path rule condition
a real-time spyware monitor to prevent the installation of and remove spyware
User Account Control (UAC)
lets you track when users log on and which resources are used
Phishing filter
lets you track when users log on and which resources are used
Password Policy
lets you track when users log on and which resources are used
Malware
lets you track when users log on and which resources are used
Windows Defender
lets you track when users log on and which resources are used
Auditing
lets you track when users log on and which resources are used
BitLocker Drive Encryption
lets you track when users log on and which resources are used
Network Access Protection (NAP)
lets you track when users log on and which resources are used
Path rule condition
lets you track when users log on and which resources are used
User Account Control (UAC)
malicious software designed to perform unauthorized acts on your computer
Phishing filter
malicious software designed to perform unauthorized acts on your computer
Password Policy
malicious software designed to perform unauthorized acts on your computer
Malware
malicious software designed to perform unauthorized acts on your computer
Windows Defender
malicious software designed to perform unauthorized acts on your computer
Auditing
malicious software designed to perform unauthorized acts on your computer
BitLocker Drive Encryption
malicious software designed to perform unauthorized acts on your computer
Network Access Protection (NAP)
malicious software designed to perform unauthorized acts on your computer
Path rule condition
malicious software designed to perform unauthorized acts on your computer
User Account Control (UAC)
prevents unauthorized Web sites from stealing log-on credentials and other personal information
Phishing filter
prevents unauthorized Web sites from stealing log-on credentials and other personal information
Password Policy
prevents unauthorized Web sites from stealing log-on credentials and other personal information
Malware
prevents unauthorized Web sites from stealing log-on credentials and other personal information
Windows Defender
prevents unauthorized Web sites from stealing log-on credentials and other personal information
Auditing
prevents unauthorized Web sites from stealing log-on credentials and other personal information
BitLocker Drive Encryption
prevents unauthorized Web sites from stealing log-on credentials and other personal information
Network Access Protection (NAP)
prevents unauthorized Web sites from stealing log-on credentials and other personal information
Path rule condition
prevents unauthorized Web sites from stealing log-on credentials and other personal information
User Account Control (UAC)
identifies software by file location
Phishing filter
identifies software by file location
Password Policy
identifies software by file location
Malware
identifies software by file location
Windows Defender
identifies software by file location
Auditing
identifies software by file location
BitLocker Drive Encryption
identifies software by file location
Network Access Protection (NAP)
identifies software by file location
Path rule condition
identifies software by file location
User Account Control (UAC)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
What are the security settings monitored by Action Center?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.