Which of the following is not an action you can perform with AppLocker?
a. Lock out unauthorized users
b. Specify the types of applications that users can run
c. Prevent unauthorized applications such as malware from executing
d. Specify rules that apply to a given user or security group
A. B, C, and D are all AppLocker functions.
Computer Science & Information Technology
You might also like to view...
The term IP routing refers explicitly to which of the following actions?
A) Learning routes B) Dynamically establishing routes using IP protocols C) Forwarding packets D) Establishing protocols for routes
Computer Science & Information Technology
Second-generation computers used ________ instead of vacuum tubes.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology