Multiple Choice
Match each term with the correct statement below.
-Designed to do varying degrees of damage to data and software,although it does not damage PC hardware
A) Everyone group
B) Drive lock password
C) Permission propagation
D) Rootkit
E) Anonymous users"
F) Authenticated Users group
G) Local shares
H) Inherited permissions
I) Malicious software
Correct Answer:

Verified
Correct Answer:
Verified
Q39: Describe one method that can be used
Q40: Certificates are managed using the _ console.<br>A)Certificate
Q41: <i>Match each term with the correct statement
Q42: A $ at the end of the
Q43: List the two methods used by antirootkit
Q45: A(n)_ running in kernel mode actually interferes
Q46: Allowing users full control of a folder
Q47: Discuss encrypting files and folders.
Q48: <i>Match each term with the correct statement
Q49: To know for sure exactly which permissions