单项选择题
A.Encrypting File System (EFS)
B.NTFS permissions
C.Syskey
D.Windows BitLocker Drive Encryption (BitLocker)
单项选择题 You need to recommend a NAP enforcement method that meets the company¯s security requirements. Which method should you recommend?()
单项选择题 You need to identify each help desk user who bypasses the new corporate security policy. What should you do?()
单项选择题 You need to protect the confidential data files on File2 against unauthorized offline access. What should you use?()