Match each item with a statement below.
A. Analyzes the installed server roles to report if they are set up to conform to Microsoft's best practices for roles.
B. A security feature that monitors how programs use memory and stops programs that attempt to use memory allocated for system programs and processes. This is intended to foil viruses, Trojan horses, and worms that attempt to invade system memory.
C. A digital signature incorporated into driver and system files as a way to verify the files and to ensure that they are not inappropriately overwritten.
D. A hardware line that a computer component, such as a disk drive or serial port, uses to communicate to the processor that it is ready to send or receive information.
E. Disk space, in the form of a file, for use when memory requirements exceed the available RAM.
F. A data parameter in the Registry stored as a value in hexadecimal, binary, or text format.
G. A category of information contained in the Windows Registry, such as hardware or software.
H. Used on Windows-based networks to facilitate multicast transmissions for multimedia communications.
I. On a network, this refers to an object, such as a shared printer or shared directory, which can be accessed by users.
J. A tool used to verify system and other critical files to determine if they have a signature.
A. Best Practices Analyzer (BPA)
B. Data Execution Prevention (DEP)
C. driver signing
D. interrupt request (IRQ) line
E. paging file
F. Registry entry
G. Registry key
H. Reliable Multicast Protocol
I. resource
J. Sigverif
You might also like to view...
On the Home tab, you find the Center button in the ________ group
Fill in the blank(s) with correct word
When pasting a range of cells you only need to point to or select the ________ of the paste area
A) upper right corner B) upper left corner C) lower left corner D) center