1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
deff fn [24]
3 years ago
7

testout You want to prevent users in your domain from running a common game on their machines. This application does not have a

d signature. You want to prevent the game from running even if the executable file is moved or renamed. signature. You want to prevent the game from running even if the executable file is moved or renamed. You decide to create an AppLocker rule to protect your computer. You decide to create an AppLocker rule to protect your computer. Which type of condition should you use in creating this rule? Which type of condition should you use in creating this rule?
Computers and Technology
1 answer:
Margarita [4]3 years ago
8 0

Answer:

Hash condition is the correct answer to the following question.

Explanation:

Hash condition provided more security than the applocker file path rule and it is manually for the files.

  • It is more secure than the path rule because each file has its separated hash condition.
  • Drawback of hash file is every time whenever when file is updated then we have to update the file hash condition.
You might be interested in
A _____ can be destructive and can modify or delete files that may not be recoverable.
umka21 [38]
Virus

Hope this helps
6 0
3 years ago
Computers have drastically changed society over the last 20 years. How have computers affected communication in the business wor
iren2701 [21]

<u>Drastic change of over society Computers:</u>

In society computer has drastically changed and it has been used to for varies purpose to do analysis or storing data, as decisions making tools. Purpose computer been found is to do huge calculation. “Compute” word has been derived to computer. Computer later stage it diverted is purpose from calculation to information store device.

Computers have heavy effect the communication in normal word and business world. Especially social media took over the control of computers. In today’s world four type of ethical issue are known in computer mainstream in the workplace they are.

1. Crime (computer)

2. failure of responsibility in the computer.

3. Protection of software records and documents etc.

4. End user  data protection and privacy.

99% of computers are protected with firewalls and antivirus. But still hackers can hack the computer and steal the data.

5 0
3 years ago
What is a way to minimize techniacl problems with your computer.
Vsevolod [243]
Have you tried turning it off and back on.Try that if that does not work then try debugging it
3 0
4 years ago
Read 2 more answers
A database is used to _____.
Cloud [144]
A database is used to organize a large collection of data, hence the name database. It is literally a base that would contain a chunk of data that a person or an organization will need to pull out later when they need it. Databases are usually used by companies or organizations
5 0
4 years ago
Read 2 more answers
How do I get to a file?
Damm [24]

Answer:

You go to the "files" in your computer

It also depends on what kind of computer/laptop u have

Explanation:

3 0
3 years ago
Other questions:
  • Harry needs to use a type of graph in a spreadsheet to show variations in data over a specific period. What type of graph or cha
    11·2 answers
  • What type of computer would integrate the system unit with the display and keyboard?
    7·1 answer
  • What block cipher mode of operation involves each ciphertext block being fed back into the encryption process to encrypt the nex
    12·1 answer
  • How would you print from 1 to 1000
    13·1 answer
  • What is a table in excel
    10·2 answers
  • The repeated use of electronic communications, such as chat rooms and email, to seek out, harass, or frighten someone is called
    12·1 answer
  • What is the difference between an activity inventory and an object inventory?
    8·1 answer
  • The following loop is intended to print the numbers 1, 2, 3, 4, 5.
    11·1 answer
  • QueSUUN TU
    15·1 answer
  • Type the numbers 1-50 and then type Computers and Technology twice type it once forward and once backwards.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!