answersLogoWhite

0


Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: What can be accomplished through using the Security Configuration Wizard a disable unused services b configure firewall rules c install a software application?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

How would one configure a WPA security?

One can configure WPA security settings by going under your internet options, which is under the control panel. While in there, there will be an option to configure your WPA settings.


How do you configure Network File System server?

There are many different ways of configuring NFS depending on your environment and security requirements. Too many to list here in a short answer. Configuration is usually specific to a site and their requirements.


What technique is used to configure one security group as member of another security group?

Group nesting


What section of Group Policy allow you to configure the maximum allowable clock skew between a client and a domain controller?

Kerberos Policy. This is found under: +Computer Configuration +Windows Settings +Security Settings +Account Policies +Kerberos Policies


What does java security do?

Defines the security policy for each application .Every Java Application can have its own Security manager.


How to configure wifi on laptop using Windows 7 and utstarcom wa300g4 modem?

i have done wireless...configuration as click wireless enabled wireless then save and apply slected security ssid given one name wepsk2 selected . security code given then save and reboot given then also wireless is not connected why??


How much is the need of information security professionals for a given it company or its luxury or soon they will be replaced by robust software?

Computer security can never be achieved solely by means of software. Security professionals are still required to configure the software according the policies and procedures and priorities of an organization. Security professionals are also required for auditing of systems to confirm proper configuration, to identify gaps and vulnerabilities, and to assist in the development of policies and procedures.


Which tool allows administrators to create and manage security profiles?

Security configuration Wizard


What technique is used to configure one security group as a member of another security group?

Group nesting ( i think not too sure tho )


What event viewer logs contains no events until you configure auditing policies?

Security Logs


Where can you get security for Linux?

Security is a concept, not an application. You get security in Linux by making the system secure.


where can I get a Social Security application ?

You can fill out an application online at www.socialsecurity.gov. Additionally, you can apply by phone or in person at any Social Security office.