You want to use software-restriction policies to prevent an application from running no matter where it’s located on the system. Which of the following rules will work?

A. A hash rule
B. A path rule
C. A network zone rule
D. An ACL rule


A. A hash rule

Computer Science & Information Technology

You might also like to view...

Rather than performing a set of instructions repeatedly to perform the same task, you can save time and ensure accuracy by creating a(n) ____________________ that performs those actions for you.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is the purpose of a protocol analyzer?

What will be an ideal response?

Computer Science & Information Technology

WhatI s a process? How is it known inside the LINUX/UNIX system?

What will be an ideal response?

Computer Science & Information Technology

Which of the following is the MOST secure to use to connect to a remote server?

A. Telnet B. rlogin C. rexec D. SSH

Computer Science & Information Technology