How to limit which applications can run on your Windows network

How to limit which applications can run on your Windows network

Assessment

Interactive Video

Architecture, Information Technology (IT), Social Studies

University

Hard

Created by

Quizizz Content

FREE Resource

The video discusses controlling workstations and applications, focusing on Windows 10 S and its restrictions. It covers methods like App Locker and Intune for application control, emphasizes the importance of removing old software, and managing user accounts. It also highlights the risks of application consent phishing and the need for network security practices.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the primary goal of developing Windows 10 S?

To enhance multimedia capabilities

To replace Windows 10 Pro

To simplify application whitelisting for users

To provide a platform for gaming

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was a major criticism of Windows 10 S?

It was too expensive

It was incompatible with most hardware

It was too restrictive for most users

It lacked security features

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool can be used to control applications in an enterprise setting?

Cortana

Microsoft Edge

App Locker

Windows Defender

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to remove old software and user accounts?

To free up storage space

To reduce network traffic

To prevent security vulnerabilities

To improve system performance

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tool can be used to report installed software on remote computers?

PowerShell

Microsoft Word

OneNote

Excel

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is application consent phishing?

A technique to gain unauthorized access through user consent

A way to update applications automatically

A process to install applications faster

A method to enhance application performance

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can administrators protect against application consent phishing?

By disabling all email notifications

By setting up an admin approval process

By allowing all applications by default

By using only third-party applications