Which of the following is not an action you can perform with AppLocker?

a. Lock out unauthorized users
b. Specify the types of applications that users can run
c. Prevent unauthorized applications such as malware from executing
d. Specify rules that apply to a given user or security group


A. B, C, and D are all AppLocker functions.

Computer Science & Information Technology

You might also like to view...

To help human readers understand why a method's statements are there, good programmers insert explanatory ____ into their methods.

A. behaviors B. actions C. comments D. conditions

Computer Science & Information Technology

Although you can type an input mask manually, it is easier to use the Input Mask ________

A) Wizard B) Guide C) Options D) Template

Computer Science & Information Technology

If you omit the fourth argument in a VLOOKUP function, Excel will assume you intend the fourth argument to be False.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Explain how NIS is used on a UNIX/Linux network.

What will be an ideal response?

Computer Science & Information Technology