Matching
Match each term with the correct statement below:
Premises:
prevents unhealthy computers from accessing the network
encrypts the entire volume of a partition and protects the system partition
controls password characteristics for local user accounts.
prompts administrative user if an administrative action is initiated by a program
a real-time spyware monitor to prevent the installation of and remove spyware
lets you track when users log on and which resources are used
malicious software designed to perform unauthorized acts on your computer
prevents unauthorized Web sites from stealing log-on credentials and other personal information
identifies software by file location
Responses:
User Account Control (UAC)
Path rule condition
Auditing
Password Policy
Windows Defender
Network Access Protection (NAP)
Malware
Phishing filter
BitLocker Drive Encryption
Correct Answer:
Premises:
Responses:
prevents unhealthy computers from accessing the network
encrypts the entire volume of a partition and protects the system partition
controls password characteristics for local user accounts.
prompts administrative user if an administrative action is initiated by a program
a real-time spyware monitor to prevent the installation of and remove spyware
lets you track when users log on and which resources are used
malicious software designed to perform unauthorized acts on your computer
prevents unauthorized Web sites from stealing log-on credentials and other personal information
identifies software by file location
Premises:
prevents unhealthy computers from accessing the network
encrypts the entire volume of a partition and protects the system partition
controls password characteristics for local user accounts.
prompts administrative user if an administrative action is initiated by a program
a real-time spyware monitor to prevent the installation of and remove spyware
lets you track when users log on and which resources are used
malicious software designed to perform unauthorized acts on your computer
prevents unauthorized Web sites from stealing log-on credentials and other personal information
identifies software by file location
Responses:
Related Questions
Q26: A(n) _ computer is one that has
Q27: While _ is a great source of
Q28: Newer Windows applications use an application _
Q29: _ is(are) used to define which programs
Q30: _ is the security process that records
Q32: _ is the process of taking data
Q33: Windows 7 includes a(n) _ policy, which
Q34: A(n) _ encryption algorithm is one-way encryption,
Q36: The most basic level of data security
Q50: _ is a method for protecting data