You want to use software-restriction policies to prevent an application from running no matter where it’s located on the system. Which of the following rules will work?
A. A hash rule
B. A path rule
C. A network zone rule
D. An ACL rule
A. A hash rule
Computer Science & Information Technology
You might also like to view...
Rather than performing a set of instructions repeatedly to perform the same task, you can save time and ensure accuracy by creating a(n) ____________________ that performs those actions for you.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
What is the purpose of a protocol analyzer?
What will be an ideal response?
Computer Science & Information Technology
WhatI s a process? How is it known inside the LINUX/UNIX system?
What will be an ideal response?
Computer Science & Information Technology
Which of the following is the MOST secure to use to connect to a remote server?
A. Telnet B. rlogin C. rexec D. SSH
Computer Science & Information Technology