Matching
Match each term with the correct statement below:
Premises:
prevents unhealthy computers from accessing the network
encrypts the entire volume of a partition and protects the system partition
controls password characteristics for local user accounts.
prompts administrative user if an administrative action is initiated by a program
a real-time spyware monitor to prevent the installation of and remove spyware
lets you track when users log on and which resources are used
malicious software designed to perform unauthorized acts on your computer
prevents unauthorized Web sites from stealing log-on credentials and other personal information
identifies software by file location
Responses:
User Account Control (UAC)
Path rule condition
Auditing
Password Policy
Windows Defender
Network Access Protection (NAP)
Malware
Phishing filter
BitLocker Drive Encryption
Correct Answer:
Premises:
Responses:
prevents unhealthy computers from accessing the network
encrypts the entire volume of a partition and protects the system partition
controls password characteristics for local user accounts.
prompts administrative user if an administrative action is initiated by a program
a real-time spyware monitor to prevent the installation of and remove spyware
lets you track when users log on and which resources are used
malicious software designed to perform unauthorized acts on your computer
prevents unauthorized Web sites from stealing log-on credentials and other personal information
identifies software by file location
Premises:
prevents unhealthy computers from accessing the network
encrypts the entire volume of a partition and protects the system partition
controls password characteristics for local user accounts.
prompts administrative user if an administrative action is initiated by a program
a real-time spyware monitor to prevent the installation of and remove spyware
lets you track when users log on and which resources are used
malicious software designed to perform unauthorized acts on your computer
prevents unauthorized Web sites from stealing log-on credentials and other personal information
identifies software by file location
Responses:
Related Questions
Q22: What are the categories of local security
Q23: _ is a method for protecting data
Q24: What are some of the settings available
Q30: Briefly describe the rule collections used by
Q35: _ is the process of taking data
Q36: A(n) _ encryption algorithm is one-way encryption,
Q37: Internet Explorer has been modified to run
Q38: _ are .inf files that contain settings
Q39: Briefly describe the changes in Windows services
Q42: What are the security settings monitored by
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents