1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MA_775_DIABLO [31]
3 years ago
10

The actual database of active directory shared resources is stored on one or more computers designated as:

Computers and Technology
1 answer:
Mila [183]3 years ago
6 0

Solution:

It is done by Native Os X command line tool that can do this.

Active Directory, the data store contains database files and processes that store and manage directory information for users, services, and applications. A copy of the data store runs on each domain controller in the forest. The Active Directory data store is often referred to as the directory.

The ideal environment for the data store includes the following:

A domain controller running an operating system in the Windows Server 2003 family and containing hardware that meets the minimum hardware requirements of the edition of the operating system (Windows Server 2003, Standard Edition; Windows Server 2003, Enterprise Edition; or Windows Server 2003, Datacenter Edition)

For environments consisting of multiple domain controllers, the presence of a fully functioning Active Directory replication topology

For environments consisting of multiple domain controllers, the presence of a fully functioning File Replication Service (FRS) topology

A regular backup schedule

Regular monitoring of Active Directory, either through manual review of event logs or through an automated monitoring solution, such as Microsoft Operations Manager (MOM)

This is the required description describes the elements of the Active Directory data store, including its architecture, protocols, interfaces, logical structure, physical structure, processes and interactions, and network ports.


You might be interested in
2) Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components
Leto [7]

Answer:

A security management model (SMM) is a representation of all the things that a firm or business can do to ensure that its environment is secure. A Security Management Model does not provide details of the security management process itself.

Sometimes, the job of the Security Manager is just to pick a generic model then adapt it to the requirements and peculiarities of the organisation.

Some security models one can select from are:

  • ISO 27000 Series (International Organization for Standardization)    
  • ITIL (Information Technology Infrastructure Library)
  • NIST (National Institute of Standards and Technology) and
  • COBIT (Control Objectives for Information and Related Technology)

Some of the  interesting components of the security management model that can be adapted for use in the SMM are:

  1. Identification of the Impact of a security breach on the business;
  2. determine preventive measures and
  3. developing recovery strategies

Cheers!

 

4 0
2 years ago
Where is permanent data in the computer stored whenever gym starts his laptop He sees some commands in numbers appearing on the
Nostrana [21]

Permanent storage, also called persistent storage, A permanent storage of the computer is hard disk. The data stored in hard disk is permanent. It is primary use is long-term data storage.gym starts his laptop He sees some commands in numbers appearing on the screen these instructions are being preceded by the control unit because when hr start the data is loaded and take some time.

4 0
3 years ago
Overview
ludmilkaskok [199]

Answer:

the answer is in the image below:

Explanation:

5 0
2 years ago
Assume that a signal is encoded using 12 bits. Assume that many of the encodings turn out to be either 000000000000, 00000000000
Mashcka [7]

Answer:

The following is the answer to this question:

Explanation:

In the binary digit

000000000000 is equal to 0 bit

000000000001 is equal to 1 bit

1 1 1 1 1 1 1 1 1 1 1 1 is equal to 10

Similarly,

000000000010=11

Thus,

00 \ 00 \ 01 \ 10\  010101010101 is equal to

000000000000, 000000000000, 000000000001 ,

000000000010,  1 1 1 1 1 1 1 1 1 1 1 1 , 000000000001 , 000000000001 , 000000000001 ,  

000000000001 , 000000000001 , 000000000001

8 0
3 years ago
How does Virtual Reality help to make work experiences more inclusive?
FrozenT [24]

Answer:

It makes your brain work better and it's also fun.

Explanation:

The brain does not like just one thing it wants to have more experience.

7 0
2 years ago
Other questions:
  • Terms that represents the achual speed used by device to transfer data​
    14·1 answer
  • Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in
    11·1 answer
  • Please help me answer this question
    14·1 answer
  • What does FLUX do when soldering an electrical joint?
    13·2 answers
  • What happens when a computer gets a virus?
    6·2 answers
  • What is the first step that you have to perform before you can add a windows package to a wim file?
    9·1 answer
  • What is computer code?<br> A. Java Script<br> B. XML<br> C. HTML<br> D. Any programming language
    6·1 answer
  • A network device that is used to connect multiple devices together without segmenting a network is a __________.
    10·1 answer
  • Moving images of real event​
    12·2 answers
  • If you give someone ______ to your device, they can control it through another phone or computer.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!