1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vichka [17]
3 years ago
10

In order to use the Active Directory Recycle Bin, all DCs in the forest must be running at least what Windows Server operating s

ystem?
Computers and Technology
1 answer:
AleksAgata [21]3 years ago
4 0

Answer:

Windows Server 2008 R2

Explanation:

The Windows Server 2008 R2 is a window server operating system that was developed by Microsoft. The server was developed on the enhancement of the Window Server 2008. This type of window server came with different improvements and benefits (such as power consumption) over the previous window servers in the market.

You might be interested in
2) Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components
Leto [7]

Answer:

A security management model (SMM) is a representation of all the things that a firm or business can do to ensure that its environment is secure. A Security Management Model does not provide details of the security management process itself.

Sometimes, the job of the Security Manager is just to pick a generic model then adapt it to the requirements and peculiarities of the organisation.

Some security models one can select from are:

  • ISO 27000 Series (International Organization for Standardization)    
  • ITIL (Information Technology Infrastructure Library)
  • NIST (National Institute of Standards and Technology) and
  • COBIT (Control Objectives for Information and Related Technology)

Some of the  interesting components of the security management model that can be adapted for use in the SMM are:

  1. Identification of the Impact of a security breach on the business;
  2. determine preventive measures and
  3. developing recovery strategies

Cheers!

 

4 0
3 years ago
The equipment that processes data in order to create information is called the _______.
Naily [24]
The equipment that processes data in order to create information is called the hardware.
6 0
3 years ago
Read 2 more answers
For what kind of shot is a fisheye lens most appropriate?
OlgaM077 [116]

Answer: B

Explanation: a fisheye lense is good for wide shots.

7 0
3 years ago
What is the effects of computer and internet attacks​
ZanzabumX [31]

Answer:

ads, damage, or bugs

Explanation:

7 0
2 years ago
Read 2 more answers
after clicking the start button on your computer screen desktop what option would you then select to examines system components
crimeas [40]
Assuming you're using Windows, you have to search for the application Device Manager. It will show you all connected devices on your system, as well as an option to modify drivers and certain options. 
3 0
3 years ago
Other questions:
  • In a case where electrical current leakage from the circuit occurs,
    7·2 answers
  • What view and zoom setting do you need for true WYSIWYG display? Why?
    14·1 answer
  • In C#Write the program SubscriptExceptionTest in which you use an array of 10 doubles. Write a try block in which you place a lo
    5·1 answer
  • Technician A says that as volume decreases, pressure increases. Technician B says that as temperature increases, pressure decrea
    15·2 answers
  • How to chnage email adresss on slate from tophat?
    13·1 answer
  • What is an operating system?<br>​
    11·2 answers
  • Logan has developed an excellent presentation with interesting content. He received great feedback on the evaluation
    10·1 answer
  • Who designed the apple i computer in 1976?
    13·1 answer
  • Lab 8-1: Working with Boot Loader and Runlevels what is the root password
    9·1 answer
  • Which two choices are examples of trivial file transfer protocol (tftp) use? (choose two. )
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!