What type of software is silently installed on your computer monitors your behavior and performs actions based on your behavior?

Match each item with a statement below.

* An encryption technology for individual files and folders that can be enabled by users

* Malicious software designed to perform unauthorized acts on your computer

* The security process that records the occurrence of specific operating system events in the Security log

* A feature in Windows 10 that elevates user privileges only when required

* A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification

* A one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed

* A collection of settings to control password characteristics such as length and complexity

* Anti-malware software included with Windows 10

* A command-line tool that is used to apply, export, or analyze security templates

Which rule condition identifies software by file location?

The path condition identifies an application by its location in the file system of the computer or on the network.

Which security process records the occurrence of specific operating system events in the security log?

Auditing is the security process that records the occurrence of specific operating system events in the Security log. Every object in Windows 7 has audit events related to it. Log entries can be recorded for successful events or failed attempted events.

What is software that is intended to damage or disable?

Malware: Malware is short for malicious software, it is a software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user and is typically included in malware?

adware. a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.