Which of the following is a method for protecting data on removable storage, such as usb drives?

focusNode

Didn't know it?
click below

Knew it?
click below

Which of the following is a method for protecting data on removable storage, such as usb drives?

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

QuestionAnswer
Internet Explorer has been modified to run in a limited state, called ________ mode, in which user files cannot be modified. protected
Windows is protected on networks by an enhanced firewall and ________. Network Access Protection
The Account Policies category contains the ________ policy and the account lockout policy. password
________ are .inf files that contain settings that correspond with the Account Policies and Local Policies in the local security policy. Security Templates
________ is a method for protecting data on removable storage such as USB drives. BitLocker To Go
________ is a central point in Windows 7 for managing the configuration of the network you are currently connected to. Networking and Sharing Center
________ provides you with an easy way to control how your computer views other computers on the network and advertises its presence on the network. Network Discovery
A ________ is responsible for enabling communications between Windows 7 and the network device in your computer. Network Driver
A ________ is used to define which part of an IP address is the network ID and which part of the IP address is the host ID. subnet mask
A ________ is a router on the local network that is used to deliver packets to a remote network. default gateway

Which of the following is the best method for protecting data on removable storage such as USB drives?

Win 7 Final Comp.

Which of the following can be used to define which programs are allowed or disallowed in the system?

Win 7 Final MC 1.

Which security process records the occurrence of specific operating system events in the security log?

Auditing is the security process that records the occurrence of specific operating system events in the Security log. Every object in Windows 7 has audit events related to it. Log entries can be recorded for successful events or failed attempted events.

Which rule condition identifies software by file location?

The path condition identifies an application by its location in the file system of the computer or on the network.