Match each item with a statement below.
A. malicious software designed to perform unauthorized acts on your computer
B. a feature in Windows 10 that elevates user privileges only when required
C. anti-malware software included with Windows 10
D. a command-line tool that is used to apply, export, or analyze security templates
E. a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed
F. A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification
G. the security process that records the occurrence of specific operating system events in the Security log
H. an encryption technology for individual files and folders that can be enabled by users
I. a collection of settings to control password characteristics such as length and complexity
A. Malware
B. User Account Control (UAC)
C. Windows Defender
D. Secedit
E. Hashing algorithm
F. BitLocker Drive Encryption
G. Auditing
H. Encrypting File System (EFS)
I. Password policy
You might also like to view...
To change an object’s position, Alice provides a method named ____.
A. say() B. think() C. move() D. playSound()
Answer the following statement(s) true (T) or false (F)
1. Photoshop uses the foreground color to fill empty areas of an image. _________________________ 2. By default, the background color is black. _________________________ 3. In a hexadecimal color value, the first pair of characters defines the green used in the color. _________________________ 4. Lab colors are considered device dependent because the Lab color should look the same to the human eye no matter which device it is displayed on. _________________________