1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksenya-84 [330]
3 years ago
14

A technician is performing Windows preventative maintenance tasks on all computers in the organization. She wants a way to creat

e a custom console containing only the tools she regularly launches and then distribute this custom console to each computer. Which of the following Windows tools will allow the technician to configure a custom console?
Computers and Technology
1 answer:
antiseptic1488 [7]3 years ago
3 0

Answer:

The tool that allows to configure a custom console is "mmc.exe".

Explanation:

MMC is a Microsoft Management Console. It is used to customize the management console and add the tools in console that are required by the technician.

You might be interested in
A lookup field allows the user to select from a list of values when updating the contents of a field. true or false.
kotykmax [81]
True im pretty sure.
7 0
3 years ago
Write an<br>algorithm and draw flow chart to<br>find greatest among 2 numbers​
antoniya [11.8K]

Answer:the question is not right

Explanation:

8 0
3 years ago
A home user reports to a network technician that the Internet is slow. The network administrator discovers that multiple unknown
BabaBlast [244]

Answer:

Option (A) A successful WPS attack has occurred

Explanation:

  • WPS stands for Wi-Fi Protected Setup.
  • Its a network security protocol in the Wi-Fi which has a vulnerability.
  • The connection to the Wi-Fi can be established through the router in four ways. They are
  • (a) PIN method
  • (b) Push button method
  • (c) Near field communication method
  • (d) USB Method.
  • Out of all the modes to be connected to the network, the PIN method has a flaw in it.
  • In this PIN method, an attacker can brute force the PIN (guessing the PIN by some techniques) and gain unauthorized access to the network.
  • In the given case in the question, the network administrator finds that multiple unauthorized devices has gained access to the network.
  • Option (A) is correct.
  • Option (B) ARP Poisoning, (C) botnet and (D) Evil Twin attack are different and so are the wrong options.  
3 0
3 years ago
Read 2 more answers
We can improve our knowledge and skills on animals and fish raising with the use of internet​
bagirrra123 [75]

Answer:

yeah that would be great

5 0
3 years ago
joe is in the planning stages to make sure that an upcoming company promotion during a major sporting event will not overwhelm h
VikaD [51]

The possible solutions to recommend are that Vertical scaling, Horizontal scaling, Cloud bursting

The cloud computing business model is based on a utilitarian business model, which charges you solely for the resources you use. With this strategy, you may scale your cloud fleet to suit its present workload and add and subtract capacity as needed. Variability may be used to scale cloud services in a variety of ways, including vertical and horizontal scaling and bursting. Horizontal scaling in cloud computing refers to adding more instances rather than switching to a bigger instance size. Vertical scaling involves the addition of more or faster CPUs, memory, or I/O resources to an existing server or the replacement of one server by a more physical server.

Learn more about the utility business model here: brainly.com/question/28668154brainly.com/question/29349562

#SPJ4

3 0
2 years ago
Other questions:
  • The numbers on the bottom of a typical check represent all of the following EXCEPT?
    12·2 answers
  • Explain the difference between general-purpose and specialized applications. Also discuss the common features of application pro
    11·1 answer
  • Where does the term for a star network describe? A) a network for Department of Defense scientists to share data about the stars
    13·2 answers
  • What is runtime error in Python? Provide an example
    14·1 answer
  • Define a function below, sum_numeric_vals, which takes a single dictionary as a parameter. The dictionary has only strings for k
    12·1 answer
  • Which of the following is true regarding a class and interface types? Group of answer choices You can convert from a class type
    9·1 answer
  • Please help if you answer correcly i will give you brainelst!!!!!!!!!!!!!!!!!!
    6·2 answers
  • Please HELP me it a test and it due rn. Please no links
    9·1 answer
  • When power is completely removed from your computer
    11·1 answer
  • Calcula l'energia (Kwh) consumida per una màquina de 30 CV que funciona durant 2 hores.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!