New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 312-38 Exam - Topic 5 Question 90 Discussion

Actual exam question for Eccouncil's 312-38 exam
Question #: 90
Topic #: 5
[All 312-38 Questions]

How does Windows' in-built security component, AppLocker, whitelist applications?

Show Suggested Answer Hide Answer
Suggested Answer: A

AppLocker whitelists applications by creating rules that specify which files are allowed to run. One of the primary methods for specifying these rules is through the use of Path Rules. Path Rules allow administrators to specify an allowed file or folder path, and any application within that path is permitted to run. This method is particularly useful for allowing applications from a known directory while blocking others that are not explicitly approved.


Contribute your Thoughts:

0/2000 characters
Silva
3 months ago
Wait, are you sure about that? Sounds off.
upvoted 0 times
...
Gabriele
3 months ago
Nope, it's definitely Certificate Rule!
upvoted 0 times
...
Devon
3 months ago
I thought it was Signature Rule?
upvoted 0 times
...
Gayla
4 months ago
Totally agree, Path Rule is the way to go!
upvoted 0 times
...
Laurena
4 months ago
AppLocker can whitelist apps using Path Rule.
upvoted 0 times
...
Gwenn
4 months ago
I’m leaning towards the Path Rule, but I remember there being multiple ways to configure AppLocker. This is tricky!
upvoted 0 times
...
Brice
4 months ago
I feel like the Certificate Rule could also be a valid option for whitelisting, but I can't recall the specifics.
upvoted 0 times
...
Alita
4 months ago
I practiced a similar question about AppLocker last week, and I think the Signature Rule was mentioned as a way to allow applications.
upvoted 0 times
...
Jennie
5 months ago
I remember studying AppLocker, but I'm not entirely sure which rule is the primary one for whitelisting. I think it might be the Path Rule?
upvoted 0 times
...
Pamella
5 months ago
Certificate rules seem like the most logical approach for AppLocker to whitelist applications. I'll go with that option unless I can find a compelling reason to choose something else.
upvoted 0 times
...
Ryan
5 months ago
Path rules sound like they could be a way to whitelist applications, but I'm not confident that's the correct answer. I'll have to review my notes on AppLocker.
upvoted 0 times
...
Lucy
5 months ago
Hmm, this one seems a bit tricky. I'm not entirely sure about the different whitelisting methods, so I'll have to think it through carefully.
upvoted 0 times
...
Mari
5 months ago
I'm pretty sure AppLocker uses certificate rules to whitelist applications, but I'll double-check the other options just in case.
upvoted 0 times
...
Marsha
5 months ago
Okay, I remember learning about this in class. I believe AppLocker uses signature rules to verify the applications that are allowed to run.
upvoted 0 times
...
Vivienne
5 months ago
I think the key here is understanding that the residual trend is the portion of the total trend that isn't explained by changes in provider reimbursement. So it's likely to have a bigger impact on the overall trend than the provider reimbursement piece.
upvoted 0 times
...
Rasheeda
5 months ago
Hmm, this is a tricky one. I'm not entirely sure which feature would be the right choice here. I'll need to think through the options carefully and make sure I understand the differences between them.
upvoted 0 times
...
Eden
1 year ago
Ha! 'Internet Zone Rule'? What is this, a joke exam? AppLocker is all about local security, not internet zones.
upvoted 0 times
...
Yuki
1 year ago
Internet Zone Rule? Really? That's for web content, not local applications. AppLocker is all about controlling what runs on the system.
upvoted 0 times
Ceola
1 year ago
Internet Zone Rule? Really? That's for web content, not local applications. AppLocker is all about controlling what runs on the system.
upvoted 0 times
...
Suzi
1 year ago
C) Using Certificate Rule
upvoted 0 times
...
Peggy
1 year ago
C) Using Certificate Rule
upvoted 0 times
...
Carmelina
1 year ago
B) Using Signature Rule
upvoted 0 times
...
Tamera
1 year ago
B) Using Signature Rule
upvoted 0 times
...
Jame
1 year ago
A) Using Path Rule
upvoted 0 times
...
Tawna
1 year ago
A) Using Path Rule
upvoted 0 times
...
...
Lisbeth
1 year ago
I believe the correct answer is B) Using Signature Rule, as digital signatures can be used to verify the integrity of applications.
upvoted 0 times
...
Sheridan
1 year ago
Definitely go with Certificate Rule. That's the most secure option, right?
upvoted 0 times
Carman
1 year ago
C) Using Certificate Rule
upvoted 0 times
...
Deonna
1 year ago
A) Using Path Rule
upvoted 0 times
...
...
Janessa
1 year ago
I'm not sure, but I think it might be C) Using Certificate Rule, as certificates can also be used to verify the authenticity of applications.
upvoted 0 times
...
Allene
2 years ago
I'm pretty sure it's using Signature Rule, that's the standard way AppLocker does whitelisting.
upvoted 0 times
Luz
1 year ago
C) Using Certificate Rule
upvoted 0 times
...
Portia
1 year ago
B) Using Signature Rule
upvoted 0 times
...
Franklyn
1 year ago
A) Using Path Rule
upvoted 0 times
...
...
Vesta
2 years ago
I agree with Felicia, because AppLocker whitelists applications based on their file path.
upvoted 0 times
...
Felicia
2 years ago
I think the answer is A) Using Path Rule.
upvoted 0 times
...

Save Cancel