ANALYZING A COMPUTER IN THIS PROCEDURE, YOU USE THE SECURITY CONFIGURA...

2. Which of the following tools can you use to compare the templates supplied by

the consultant with the security configurations you have already created on your

servers? (Choose all answers that are correct.)

a. The Security Templates snap-in

b. Secedit.exe

c. The Security Configuration And Analysis snap-in

d. The Group Policy Object Editor console

b and c