A New Certificate Rule allows you to specify the source of trusted software that should be allowed to run without prompting a user

What will be an ideal response?

prompting. This type of rule identifies software according to its signing certificate.

Computer Science & Information Technology

You might also like to view...

A(n) ________ is inserted into a network segment so that the traffic that it is monitoring must pass through the sensor.

A. passive sensor B. analysis sensor C. LAN sensor D. inline sensor

Computer Science & Information Technology

A program can obtain the name of its module through identifier ____________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology