This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Choose the best response for each of the questions below.
Which solution is used to control the applications that must earn trust to be run?
Exploit protection
Controlled folder access
Application control
Which option below is an attack surface reduction rule that can be configured?
Block PowerShell from executing
Block process creations originating from PSExec and WMI commands
Block content from mobile devices
Which of the following items is a deployment option?
PowerShell
ASRConfig.exe
Microsoft Deployment System
You must answer all questions before checking your work.
Was this page helpful?