A. top 10 most frequently used usernames and passwords
B. top 10 default usernames and passwords
C. top 10 random password generators
D. default usernames and passwords
A. by installing a light agent on all covered devices
B. by installing HP Endpoint Security Controller on all covered devices
C. by installing HP BlOSphere on all covered devices
D. by installing Certified Self-Encrypting software on all covered devices
A. by monitoring key processes, alerting you of changes, and asking you to confirm restarting stopped processes
B. by monitoring key processes, alerting you of changes, and automatically restarting stopped processes
C. by monitoring all Windows processes and asking you to confirm restarting stopped processes
D. by monitoring all processes, alerting you of changes, and asking you to confirm restarting stopped processes