1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara31 [8.8K]
4 years ago
7

The Security Configuration Wizard saves any changes that are made as a __________ security policy which can be used as a baselin

e and applied to other servers in the network.
Computers and Technology
1 answer:
Brums [2.3K]4 years ago
7 0

Complete Question:

The Security Configuration Wizard saves any changes that are made as a __________ security policy which can be used as a baseline and applied to other servers in the network.

Group of answer choices

A. user- or server-specific

B. port- or program-specific

C. role- or function-specific

D. file or folder-specific

Answer:

C. role- or function-specific.

Explanation:

The Security Configuration Wizard (SCW) was first used by Microsoft in its development of the Windows Server 2003 Service Pack 1. The main purpose of the SCW is to provide guidance to network administrators, secure domain controllers, firewall rules and reduce the attack surface on production servers.

Generally, The Security Configuration Wizard saves any changes that are made as a role- or function-specific security policy which can be used as a baseline and applied to other servers in the network.

After a network administrator checks the Group policy, any changes made as a role- or function-specific security policy by the Security Configuration Wizard (SCW) is used as a baseline and can be applied either immediately or sometimes in the future to other servers in the network after it has been tested in a well secured environment.

Additionally, the Microsoft Security Configuration Wizard (SCW) assist administrators in running the following;

1. Network and Firewall Security settings.

2. Auditing Policy settings.

3. Registry settings.

4. Role-Based Service Configuration.

You might be interested in
Mark for review (Will be highlighted on the review page) 3. Which one of the following word processing features saves you the mo
Maksim231197 [3]
B- find and replace can replace any word in the document with another.

7 0
3 years ago
TODAYS ATTENDANCE QUESTION: Why do you think it is important to be able to measure using a ruler in Technology & Engineering
Vaselesa [24]

Answer:

Because it takes precision to a lot of things in tech and Eng. We need to measure all kinds of things, like wood, metal/etc. for computers and things that we use everyday, Because our world goes around being precise about things that we need everyday, like tables and things.

Explanation:

3 0
3 years ago
21
n200080 [17]

Answer:

slide sorter view

Explanation:

Explanation: while you can use 3/4 of these options to reorder slides, it is more common to use slide sorter view.

8 0
3 years ago
Advantages of monolithic operating system? ​
Lyrx [107]

Advntage:

provides CPU scheduling, memory management, file management, and other operating system functions through system calls. The other one is that it is a single large process running entirely in a single address space.

Disadvantage: if anyone service fails it leads to an entire system failure

8 0
2 years ago
Select the correct category of cybersecurity described.
Shalnov [3]

Answer:

Network security

Explanation:

Network security is a category of cybersecurity that is related to the protection of the infrastructure of the computer network from unauthorized access and intrusion that may be from intended attack or from an expedient  program which may result in the modification, malfunctioning, misuse or unacceptable disclosure of the network and the contents of the network

The category of cybersecurity that 'prevents intruders from accessing, misusing, destroying, adapting, or improperly disclosing networks, network infrastructure, or the information contained within networks' is network security.

6 0
3 years ago
Other questions:
  • Which statements describe the advantages of using XML?
    12·2 answers
  • A DSLR camera is made up of two parts. They are
    13·2 answers
  • Which letters appear in the home row on a keyboard?
    14·2 answers
  • During a night flight, you observe a steady red light and a flashing red light ahead and at the same altitude. What is the gener
    11·1 answer
  • Solve a single producer, single consumer problem using wait() and notifyAll(). The producer must not overflow the shared buffer,
    5·1 answer
  • Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
    12·2 answers
  • What is the purpose of the Zoom dialog box? to put the selected range in ascending order in a query to put the selected range in
    13·2 answers
  • An application's certificate indicates the application -
    5·1 answer
  • Ultraportable computers will often use ___ technology exclusively, even though their storage capacity is lower than that of a tr
    8·1 answer
  • Match each type of video camera to its features:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!