Match each item with a statement below.
A. malicious software designed to perform unauthorized acts on your computer
B. a feature in Windows 10 that elevates user privileges only when required
C. anti-malware software included with Windows 10
D. a command-line tool that is used to apply, export, or analyze security templates
E. a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed
F. A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification
G. the security process that records the occurrence of specific operating system events in the Security log
H. an encryption technology for individual files and folders that can be enabled by users
I. a collection of settings to control password characteristics such as length and complexity
A. Malware
B. User Account Control (UAC)
C. Windows Defender
D. Secedit
E. Hashing algorithm
F. BitLocker Drive Encryption
G. Auditing
H. Encrypting File System (EFS)
I. Password policy
You might also like to view...
How does inheritance relate to polymorphism in Java?
What will be an ideal response?
The last step of the Mail Merge Wizard ________
A) previews the merge B) completes the merge C) merges the data source with the main document D) selects the data source
NetWare uses ____ to move data from one location to another to maintain effective use of available hard drive space.
A. data mitigation B. data harvesting C. data gathering D. data migration
Which of the following enables access and management capabilities on servers and network devices even when there is no power to the device?
A. lights-out management B. remote management C. SNMP D. virtual management