Which of the following enables administrators to specify what programs are allowed to run on the desktop in a domain-based environment?

a. AppLocker
b. BitLocker
c. Credential Manager
d. Secure Startup


A. AppLocker replaces the older software restriction policies.

Computer Science & Information Technology

You might also like to view...

Association analysis can be used to find anomalies as follows. Find strong as- sociation patterns, which involve some minimum number of objects. Anoma- lies are those objects that do not belong to any such patterns. To make this more concrete, we note that the hyperclique association pattern discussed in Section 6.8 is particularly suitable for such an approach. Specifically, given a user-selected h-confidence level, maximal hyperclique patterns of objects are found. All objects that do not appear in a maximal hyperclique pattern of at least size three are classified as outliers.

(a) Does this technique fall into any of the categories discussed in this chapter? If so, which one? (b) Name one potential strength and one potential weakness of this ap- proach.

Computer Science & Information Technology

One type of wireless networking that does not use signals in the radio frequency (RF) band of the electromagnetic spectrum is _________, which sends data as a form of rays over relatively short distances.

A. infrared (IR) transmission B. cellular transmission C. electromagnetic induction D. hetero junction bipolar induction

Computer Science & Information Technology

The Report tool generates a report by displaying all records and all fields from the selected record source

Indicate whether the statement is true or false

Computer Science & Information Technology

A technician has just installed a new hard drive into a Windows Vista desktop computer. The hard drive does not appear in Windows Explorer. Which of the following should the technician perform NEXT to have the drive recognized by the system?

A. Initialize and format the hard drive through Disk Management B. Reboot the system C. Assign a drive letter to the hard drive through Disk Management D. Configure the drive in the systems CMOS program

Computer Science & Information Technology