Windows Security Final

1. |c |1.1 |Security Strategies in Windows Platforms and Applications, Pages 22–23 |
|2. |b |1.2 |Security Strategies in Windows Platforms and Applications, Page 27 |
|3. |d |1.3 |Security Strategies in Windows Platforms and Applications, Page 31 |
|4. |c |1.4 |Security Strategies in Windows Platforms and Applications, Page 32 |
|5. |a |1.5 |Security Strategies in Windows Platforms and Applications, Page 32 |
|6. |c |2.1 |Security Strategies in Windows Platforms and Applications, Page 42 |
|7. |a |2.2 |Security Strategies in Windows Platforms and Applications, Page 44 |
|8. |b |2.3 |Security Strategies in Windows Platforms and Applications, Page 43 |
|9. |a |2.4 |Security Strategies in Windows Platforms and Applications, Page 44 |
|10. |d |2.5 |Security Strategies in Windows Platforms and Applications, Page 60 |
|11. |b |3.1 |Security Strategies in Windows Platforms and Applications, Page 70 |
|12. |a |3.2 |Security Strategies in Windows Platforms and Applications, Page 68 |
|13. |b |3.3 |Security Strategies in Windows Platforms and Applications, Page 80 |
|14. |c |3.4 |Security Strategies in Windows Platforms and Applications, Page 83 |
|15. |d |3.5 |Security Strategies in Windows Platforms and Applications, Page 83 |
|16. |b |4.1 |Security Strategies in Windows Platforms and Applications, Page 90 |
|17. |c |4.2 |Security Strategies in Windows Platforms and Applications, Pages 96–97 |
|18. |c |4.3 |Security Strategies in Windows Platforms and Applications, Page 96 |
|19. |c |4.3 |Security Strategies in Windows Platforms and Applications, Pages 98–100 |
|20. |b |4.4 |Security Strategies in Windows Platforms and Applications, Page 100 |
|21. |c |5.1 |Security Strategies in Windows Platforms and Applications, Page 110 |
|22. |b |5.2 |Security Strategies in Windows Platforms and Applications, Page 117 |
|23. |a |5.3 |Security Strategies in Windows Platforms and Applications, Page 123 |
|24. |c |5.4 |Security Strategies in Windows Platforms…