b. It allows an administrator to analyze a computer and compare its configuration settings with a baseline.
c. It can apply a baseline to force current computer settings to match the settings defined in the baseline.
d. It uses security templates to store the settings that make up baselines.
Answer: a. It evaluates the current security state of computers in accordance with Microsoft security recommendations
Explanation:
The Security Configuration and Analysis tool allows the configuration of local computers through the application of the settings in a security template to the local policy.
This allows an administrator to analyze a computer and compare its configuration settings with a baseline. The Security Configuration and Analysis (SCA) tool also uses security templates to store the settings that make up baselines.
Therefore, based on the options given, the correct option is A as the SCA tool doesn't evaluate the current security state of computers in accordance with Microsoft security recommendations.
Answer:
Its A Dynamic Web Page
Explanation:
baseline
internet layer
data link layer
Answer:
Digital Certificate is the correct answer of this question.
Explanation:
Digital certificates are always for encryption and identification for transmitting public keys.The concept of digital certificate is a data structure used for linking an authenticated person to a public key. It is used to cryptographically attach public key rights to the organization that controls it.
For example:- Verisign, Entrust, etc.
Mobile phone
Workstation
Server
Answer:
C.system prototyping
Explanation:
Prototyping produces a quickly constructed working version of the proposed information system.
Planning
↓
Analysis
↓
Design
↓
System prototyping
↓
Implementation
Answer:
c. system prototyping
Explanation:
system prototyping produces a full-featured, working model of the information system.
A lot of laptops and desktop computers are known to have built-in slots that can connect with a cable lock. A person can keep their Laptops from getting Lost or stolen by;
learn more about laptop from
Answer & Explanation:
No Browsing History:
Phishing Scam
Suspicious File Attachment
Antivirus Software Outdated
Laptop's Physical Security