1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garri49 [273]
3 years ago
10

You are configuring common GPO properties for folders. You want to only specify that only portable computers that are docker hav

e a preference applied.
What will accomplish this?
Computers and Technology
1 answer:
Pani-rosa [81]3 years ago
5 0

Answer:

See Explanations

Explanation:

Configuring Processing Order and Precedence

Multiple Group Policy Objects (GPOs) can be linked to the same site, domain, or organizational

unit (OU), and OUs inherit GPOs from higher-level containers. GPOs are processed serially, with

local computer Group Policy processed frst. Inherited GPOs are then processed, unless they

are blocked or enforced (see the sections entitled "Confguring blocking of inheritance" and

"Confguring enforcement of inheritance" later in this chapter). The GPOs linked directly to the

domain or OU are processed in the order they are linked; then enforced GPOs are processed.

Where multiple GPOs are confguring the same Group Policy setting, the last one processed

controls the setting. You can control the order of linking for an OU or domain, as well as controlling inheritance to some extent. You can block inheritance at the domain or OU level, but

where the higher-level link to the GPO is set to Enforced, the inheritance can't be blocked and

enforced links are the last processed—again, in the reverse link order.

To see the order of linked GPOs, use the Group Policy Management Console (GPMC).

Select the domain or OU for which you want to see the link order in the console tree, and

then select the Linked Group Policy Objects tab in the details pane, as shown in Figure 6-1.

To change the link order, select a link in the Linked Group Policy Objects pane and then

use the arrow buttons on the left to move the order up or down, as desired. Move a linked

GPO to a lower Link Order number to have it processed later. Thus a GPO with a Link Order

of 1 will be processed after a GPO with a Link Order of 2; and if both GPOs have a policy confguration for the same setting, the GPO with a Link Order of 1 will be the controlling GPO.

Remember that policy settings can also be inherited. To see all the GPOs that affect a

given OU or domain, use the GPMC and follow these steps:

1. Expand the console tree of the GPMC and select the OU or domain for which you want

to see the GPOs.

2. In the details pane, select the Group Policy Inheritance tab, as shown in Figure 6-2

Remember that policy settings can also be inherited. To see all the GPOs that affect a

given OU or domain, use the GPMC and follow these steps:

1. Expand the console tree of the GPMC and select the OU or domain for which you want

to see the GPOs.

2. In the details pane, select the Group Policy Inheritance tab, as shown in Figure 6-2

You might be interested in
Crystal detected a problem in a computer network, due to which she could not send or receive data within the network. She pings
babymother [125]
<span>Conflict of IP address in the computers. when computer are networked each computer is given a unique IP address. If two computers have the same IP there will be conflict which lead to failure in sending and receiving data within the network. It can be resolved by checking the IP addresses of each computer and correcting it.</span>
3 0
3 years ago
Read 2 more answers
When issued a GFE device, you are required to sign an AUP
pav-90 [236]
GFE stands for Government Furnished Equipment. While AUP is Acceptable Use Policy (AUP). The AUP  should be read and signed by employees annually.  <span><span> </span></span>The statement that "When issued a GFE device, you are required to sign an AUP" is true. 
7 0
3 years ago
Read 2 more answers
Computers that are close to one another are connected to form a LAN
Archy [21]

Explanation:

different computer are connected to a LAN by a cable and an interface card

6 0
3 years ago
If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature
Goshia [24]

The key would he use to create the digital signature is Mike public key.

<h3>Which key is used to sign messages?</h3>

Digital signatures are known to be used via public key. Here, the person is said to be one who is said to produce or creates the digital signature that  uses a private key to encrypt signature-linked data.

The only way to decrypt a data is only with the signer's public key, the key David would use to create the digital signature is Mike public key.

Learn more about  public key from

brainly.com/question/17486027

7 0
2 years ago
Answer quick plzzz I only have 2 hours
Nana76 [90]

Answer:

option 2

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Once the technology for the collection of solar power is in place what will be two benefits of its use
    9·1 answer
  • Which folder is the default choice for saving bitmap or JPEG files created by a user?
    9·1 answer
  • It is important to ____ the line in the code editing window in the exact location where you want to insert a code snippet to pro
    10·1 answer
  • Amanda needs to create an informative print brochure for her local library’s fundraiser dinner. What critical detail must she ha
    14·2 answers
  • What career cluster does a fish and game warden fall in?
    14·1 answer
  • Password is an example of an authentication mechanisms that is based on " what an entity has".
    6·2 answers
  • When entering data in Access if the data is entered using an Access form, that data is stored in a table or tables. TRUE FALSE
    12·1 answer
  • Which item is used for formatting in responsive web design?
    14·2 answers
  • Select the correct answer. Which step references adding color, size, and media format in your digital portfolio? A. identifying
    6·1 answer
  • Question 1 of 10
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!