The ___________________ helps a user schedule automated tasks that perform actions at a specific time or when
Fill in the blank with the appropriate term.
The ___________________ helps a user schedule automated tasks that perform actions at a specific time or when a certain event occurs.
Which of the following is the reason of properly securing an audit log?
Which of the following is the reason of properly securing an audit log?
A __________________ is an update that contains one or more files designed to address a particular vulnerabili
Fill in the blank with the appropriate word.
A __________________ is an update that contains one or more files designed to address a particular vulnerability in Windows 7 security.
What is a feature of the Windows 7 operating system that includes enhanced capabilities for consolidating digi
Fill in the blank with the appropriate term.
Microsoft___________________is a feature of the Windows 7 operating system that includes enhanced capabilities for consolidating digital entertainment and media content and delivering it, on demand, to the user.
Which of the following is used to describe the policy of maximum password age?
Which of the following is used to describe the policy of maximum password age?
A _____________ is an account under which different services start.
Fill in the blank with the appropriate term.
A _____________ is an account under which different services start.
Which of the following is often used for one-to-many communications using broadcast or multicast IP datagrams?
Which of the following is often used for one-to-many communications using broadcast or multicast IP datagrams?
On the other hand, in a _____________ connection, the files remain right where they are: on the host computer,
Fill in the blanks with the appropriate terms.
In a ____________ connection, a user has to wait for the files to be transmitted to the laptop before he can begin working and if he is connected to the office machine using a dial-up modem, he will have to wait for some time. On the other hand, in a _____________ connection, the files remain right where they are: on the host computer, which does all processing.
Which of the following is used to protect all filesstored on the drive on which Windows is installed?
Which of the following is used to protect all filesstored on the drive on which Windows is installed?
Windows ____________ is a command-line shell and scripting language designed especially for system administrat
Fill in the blank with the appropriate word.
Windows ____________ is a command-line shell and scripting language designed especially for system administration.