1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara31 [8.8K]
3 years ago
7

The Security Configuration Wizard saves any changes that are made as a __________ security policy which can be used as a baselin

e and applied to other servers in the network.
Computers and Technology
1 answer:
Brums [2.3K]3 years ago
7 0

Complete Question:

The Security Configuration Wizard saves any changes that are made as a __________ security policy which can be used as a baseline and applied to other servers in the network.

Group of answer choices

A. user- or server-specific

B. port- or program-specific

C. role- or function-specific

D. file or folder-specific

Answer:

C. role- or function-specific.

Explanation:

The Security Configuration Wizard (SCW) was first used by Microsoft in its development of the Windows Server 2003 Service Pack 1. The main purpose of the SCW is to provide guidance to network administrators, secure domain controllers, firewall rules and reduce the attack surface on production servers.

Generally, The Security Configuration Wizard saves any changes that are made as a role- or function-specific security policy which can be used as a baseline and applied to other servers in the network.

After a network administrator checks the Group policy, any changes made as a role- or function-specific security policy by the Security Configuration Wizard (SCW) is used as a baseline and can be applied either immediately or sometimes in the future to other servers in the network after it has been tested in a well secured environment.

Additionally, the Microsoft Security Configuration Wizard (SCW) assist administrators in running the following;

1. Network and Firewall Security settings.

2. Auditing Policy settings.

3. Registry settings.

4. Role-Based Service Configuration.

You might be interested in
A _ is the acknowledgment of a potential noncomformity, or an opinion regarding an issue that is not covered by a standard
sleet_krkn [62]
Assumption - hope this helped took the test and got 100
5 0
3 years ago
Define a function typeHistogram that takes an iterator ""it"" (representing a sequence of values of different types) and builds
Alexeev081 [22]

Answer:

def typeHistogram(it,n):

   d = dict()

   for i in it:

       n -=1

       if n>=0:

           if str(type(i).__name__) not in d.keys():

               d.setdefault(type(i).__name__,1)

           else:

               d[str(type(i).__name__)] += 1

       else:

           break

   return list(d.items())

it = iter([1,2,'a','b','c',4,5])

print(typeHistogram(it,7))

Explanation:

  • Create a typeHistogram function that has 2 parameters namely "it" and "n" where "it" is an iterator used to represent a sequence of values of different types while "n" is the total number of elements in the sequence.
  • Initialize an empty dictionary and loop through the iterator "it".
  • Check if n is greater than 0 and current string is not present in the dictionary, then set default type as 1 otherwise increment by 1.
  • At the end return the list of items.
  • Finally initialize the iterator and display the histogram by calling the typeHistogram.
3 0
3 years ago
What theme could come from Piper's feelings and actions. Pixars short film piper
kaheart [24]

Answer:

Overcoming Fear

Explanation:

Given that a movie theme stimulates a universal human ordeal and at the same time, Piper is a short animated movie that was released in 2016. The fundamental idea of the movie is about a baby sandpiper who has to survive and conquer his anxiety and phobia of the water.

Hence, in this situation, the theme that could come from Piper's feelings and action is OVERCOMING FEAR

5 0
3 years ago
Assume the variable myWord references a string. Write a statement that uses a slicing
givi [52]

Answer:

"myWord[-5:]"

Explanation:

So whenever you slice a string, the syntax in python is expressed as:

string[a:b:c]

where a=start index (this is included in the sliced string)

b = end index (this is excluded from the sliced string)

c = increment

If any of these are included, they are set to default values, where a=0, b=len(string), and c=1.

The increment isn't necessary here, and it's just so you know the syntax a bit more

Anyways, I'm assuming when the question asks to display "the last 5 characters in the string" it means in order? e.g "abcdefghijk" -> "ghijk" and not "abcdefghijk" -> "kjihg"

The last piece of information to know is what a negative index represents.

For example if I have the piece of code

"

string = "hello world"

print(string[-1])

"

This will output "d", and the negative 1 represents the last letter. If you did -2, it would output the 2nd to last letter and so on.

So to print the last 5 characters, we simply use the -5 as the starting index.  

"

string = "hello world"

print(string[-5:])

"

This will print "world" or in other words, the last 5 letters. The reason for this is because the -5 in the first spot means the starting index is the 5th to last letter, and when you have the : after the -5, this is the way of telling python you're slicing the string, and not indexing 1 character. You don't need to include another value after that, because it will default to the last index of the string, or more specifically the last index + 1, since the last index is still included.

So the last thing to know, is that if the string isn't greater than 5 characters, it just prints the entire string, and no errors are raised. You can test this out your self as well. So whenever you have a string that's less than 5 characters the entire string is outputted.

3 0
2 years ago
Traditionally, remote administrative access on routers was configured using Telnet on TCP port 23. However, Telnet was developed
FinnZ [79.3K]

<u>Explanation</u>:

It is an all-too-often used technology today in connecting several computers together via a network.

Routing simple terms means the action of selecting the path taken by the traffic of data in a network of computers. The routing systems involve the use of both wireless and cable based architectures. Some common example of routing systems includes:

  1. Dynamic Routing
  2. Static routing
  3. Default Routing
5 0
3 years ago
Other questions:
  • Arpanet was developed by the united states so that there was a communication network that would survive a nuclear war. True or F
    11·1 answer
  • What is the purpose of a mail merge field?
    9·2 answers
  • To support continuous improvement efforts in the workplace, you increase the number of tasks that an employee performs and have
    7·1 answer
  • Was the type writer the first part of the keyboard? ​
    8·1 answer
  • Exceptions can be handled in all of these ways except:
    6·1 answer
  • True or false: when an ospf route sends its link state information, it is sent only to those nodes directly attached neighbors.
    14·1 answer
  • Vannevar Bush imagined a desktop computing machine that would allow people to access data stored in various information centers
    13·1 answer
  • Someone, please answer this.
    15·1 answer
  • The maximum number of characters that a cell can contain is
    11·2 answers
  • Select the correct answer.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!