During a simulated assessment, a tester wants the detection software to remain inactive after system restarts. Which modification would most effectively keep the security service from launching at every boot?
Adjust the security service startup configuration in the registry to keep it disabled after restarts
Stop the detection agent’s user interface from launching through a custom script
Delete error logs from device memory to remove any stored threat information
Remove strict activity logging through local policies to reduce recorded alerts
Altering the service startup setting in the registry prevents it from loading when the system restarts. Changing or disabling the service at the registry level disables the underlying monitoring functionality. Adjusting only group policy settings impacts system logs but does not necessarily halt the detection process. Turning off the user interface does not prevent service operation. Deleting logs from memory does not stop the protective software from starting again.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Windows registry and how does it control system configurations?
Open an interactive chat with Bash
How do startup configurations in the registry impact security software?
Open an interactive chat with Bash
What is the difference between the user interface and the underlying service of security software?