1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatyana61 [14]
2 years ago
10

Lin is creating a template for the configuration of Windows servers in her organization. The configuration includes the basic se

curity settings that should apply to all systems. What type of document should she create
Computers and Technology
1 answer:
larisa86 [58]2 years ago
3 0

The type of document should she create is  baseline document. Check more about the term Baseline below.

<h3>What is a Baseline document?</h3>

A Baseline document is known to be a kind official or legalized document that has passed through some measures of start approval and was used for its purpose.

Note that for Lin to be able to make the template for the configuration of Windows servers, the type of document that she can create is  baseline document.

Learn more about Windows servers  from

brainly.com/question/14526761

#SJ1

You might be interested in
Many networks are set up using a hierarchical architecture to create a "backbone" network. In this system, several connected rou
34kurt

Answer:

Explanation:

For example with the hierarchical network design of Cisco (three-layer) it is worth mentioning the following benefits:

- This type of infrastructure is highly reliable

- The complex problem regarding network design is broken into smaller and manageable areas.

- Improved access, access, core layers and distribution

-  The hierarchy provides specific functions important in defining its role within the whole network.

Regarding the access layers in the hierarchy the following are core benefits:

- Layer 2 switching

- Virtual access control lists (VACLs)

- Power over Ethernet (PoE) and auxiliary VLANs for VoIP

- Spanning tree

- High availability

- Port security

- Address Resolution Protocol (ARP) inspection

5 0
4 years ago
The which command _________________. a. can only be used to search for executables b. searches for a file in all directories sta
dsp73
Answer: D. Searches for a file only in the directories that are in the path variable
6 0
2 years ago
How to plot probability density function on desmos
sertanlavr [38]

Answer:

Explanation:

6 0
3 years ago
Union Carbide accident safety policies and procedures were not followed was due to
DedPeter [7]

Answer:

Defects in design, maintenance letdowns, lack of training, economy dealings, and blunders in operations.  

Explanation:

The design definitely was not appropriate, and there was lack in maintenance. Also there was lack of training, and blunders in operations. The project was not sound economically as well. And, you should know that problem arose due to water leakage. And that was due to mainly maintenance failure, which you can study in deep through Material Science. Lack of design is part of industrial design and others are part of management.

3 0
3 years ago
A high bandwidth gives you faster what
Nataly_w [17]
Results in faster speeds.
8 0
4 years ago
Other questions:
  • In an open computer network such as the internet, hipaa requires the use of _____. in a closed system such as a local area netwo
    7·1 answer
  • _ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manne
    6·1 answer
  • List the five parts of a system.describe them.
    12·1 answer
  • Write a program that reads a stream of integers from the console and stores them in an array. The array is then analyzed to comp
    10·1 answer
  • What is an Odometer (Driver's Ed)
    7·2 answers
  • import java.util.Scanner; public class ArraySum { public static void main(String[] args) { Scanner scnr = new Scanner(System.in)
    9·1 answer
  • A computer takes a lot of time to do complex calculation​
    9·1 answer
  • I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRIST AND CORRECT
    10·2 answers
  • We investigated a program which is probably used as one component of a bigger password breaking algorithm. We determined that th
    14·1 answer
  • Which of the following is not an Error Style for data validation?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!