A client computers on your company network run Windows 7. Employees log on to their computers
as Standard users. There is a zero-day malicious software attack affecting your network. Employees
receive User AccountControl (UAC) messages frequently requesting permission to elevate privileges.
You know that this malicious software attack is responsible for these UAC prompts. You need to
ensure that employees are unable to provide elevated credentials. What should you do?
A.
Configure the Group Policy User Account Control: Only elevate executables that are signed and
validated setting to Disabled.
B.
Configure the Group Policy User Account Control: Switch to the secure desktop when prompting
for elevation setting to Disabled.
C.
Configure the Group Policy User Account Control: Behavior of the elevation prompt for standard
users setting to Automatically deny elevation requests.
D.
Configure the Group Policy User Account Control: Behavior of the elevation prompt for
administrators in Admin Approval Mode setting to Prompt for consent for non-Windows binaries.