1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara [203]
3 years ago
9

You are asked by your supervisor to export NPS configuaration from a server. Your supervisor contacts you and tells you it is mi

ssing the log files. What must you do to provide your supervisor with the NPS log files?
Computers and Technology
1 answer:
Vesna [10]3 years ago
3 0

Answer:

You must import the NPS configurations, then manually cnfigure the SQL Server Logging on the target machine.

Explanation:

The SQL Server Logging settings are not in anyway exported. If the SQL Server Logging was designed on the root machine, the a manually configure of SQL Server Logging has to be done on the target machine after the NPS configurations must have been imported.

Although administrator rights is needed at least to import and export NPS settings and configurations, while that isn’t the issue in this case. NPS configurations are moved to a XML file that is non-encrypted by default. There is no wizard or tool whatsoever to export or import the configuration files.

You might be interested in
Declaring a member as ____ in the base class provides access to that member in the derived classes but not to anyone else. a. pu
Sidana [21]

When a member is declared as b. <u>protected</u> in the base class, it provides access to that member in the derived classes but not to anyone else.

<h3>What is a derived class?</h3>

A derived class can be defined as a type of class that inherits the information or members of a base (parent) class such as a car in a syntax.

Basically, a public class is accessible to everybody while a private class can only be accessed by users within the declared class. Also, a constant is a class whose value remains unchanged.

In Computer programming, when a member is declared as <u>protected</u> in the base class, it ultimately provides access to that member only in the derived classes but not to other members or anyone else.

Read more on data types here: brainly.com/question/20264183

#SPJ1

6 0
2 years ago
How to achieve competitive advantage using information systems models
Maurinko [17]

Information systems can achieve competitive advantage by engaging in:

  • Lowering costing.
  • Boasting differentiation of their product.
  • Changing Their competitive scope.

<h3>What is competitive advantage?</h3>

Competitive advantage is known to be that  factors that helps a firm to produce goods or services better or relatively more cheaply than their counterparts.

Note that in the case above, Information systems can achieve competitive advantage by engaging in:

  • Lowering costing.
  • Boasting differentiation of their product.
  • Changing Their competitive scope.

Learn more about competitive advantage from

brainly.com/question/14030554

#SPJ12

4 0
2 years ago
Does anyone know the answer for question d (questions in the picture btw)
VashaNatasha [74]
Yessssss bdbfbfbsjebfjcjde
6 0
3 years ago
When charlie attaches a file to an email message, the computer's __________ is responsible for managing his access to the locati
gulaghasi [49]

Answer:Operating system

Explanation:

5 0
2 years ago
Android OS "AFTER" Alpha.<br><br> A. Bubblegum<br><br> B. Beta<br><br> C. Berry<br><br> D. Buzz Cola
algol13
Alpha is first trial run

Beta usually comes next, with patches and fixes to problems or shortfalls in the Alpha test release

Then more tweaks/fixes comes a full public rollout.

Believe Android release 11.0 beta version testing started in June of 2020.
3 0
3 years ago
Other questions:
  • All of the following are recommended to secure a wireless network EXCEPT:
    5·2 answers
  • Your program is going to compare the distinct salaries of two individuals for the last 5 years. If the salary for the two indivi
    15·1 answer
  • A chef writing up her famed recipe for beef stew realizes she has switched parsley and oregano everywhere in the recipe. The che
    13·1 answer
  • When gathering information, which of the following tasks might you need to
    13·1 answer
  • What is one of the first steps a financial planner might take when working with a client?
    14·2 answers
  • Write a function named remove_duplicates that takes a list (of numeric and/or string values) and returns a new list with only th
    9·1 answer
  • Regarding computer protection, quarantining is defined as ________.
    9·1 answer
  • Implement the above in c++, you will write a test program named create_and_test_hash.cc . Your programs should run from the term
    9·1 answer
  • Which tab should you use to change the text font color in your presentation?
    15·1 answer
  • A Chain of dry-cleaning outlets wants to improve its operations by using data from devices at individual locations to make real-
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!