1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Otrada [13]
3 years ago
12

You have three users who travel to four branch offices often and need to log on to the RODCs at these offices. The branch office

s are connected to the main office with slow WAN links. You don’t want domain controllers at the main office to authenticate these four users when they log on at the branch offices. What should you do that requires the least administrative effort yet adheres to best practices?
Computers and Technology
1 answer:
liberstina [14]3 years ago
8 0

Answer:

Configure Caching on RODCs using PRP.

Explanation

Read only domain controller is a domain controller that allows active directories for read only purposes. An administrator can setup RODCs for branches of a company and control the domain controller of the database server, updating the database which can be viewed as a read only partition in RODC.

Authenticating users in a RODC rely on the domain controller to forward the credentials to the read only domain controller. This can impose to high traffic on a slow WAN network link, especially when many users are trying to authenticate, resulting to high bandwidth.

To avoid this, credential caching by configuring password replication policy (PRP) on the RODC is vital.  

When PRP is configure on RODC, the user only get to authenticate once, then the user password is replicated and encrypted for subsequent use.

You might be interested in
Se numeşte permutare a unei mulţimi finite orice rearanjare a tuturor elementelor acelei mulţimi.
nydimaria [60]
Um......English please
8 0
3 years ago
What common variation of the Server Message Block (SMB) sharing protocol is considered to be a dialect of SMB?
ser-zykov [4K]

Answer:

Common Internet File System

Explanation:

Given that the Server Message Block (SMB) has various types or variations. The most common variation of this Server Message Block sharing protocol that is considered to be a dialect of SMB is known as "Common Internet File System." This is known to serve as a form of a communication protocol for giving shared access to different outlets between nodes on a network.

Hence, in this case, the correct answer is "Common Internet File System"

8 0
3 years ago
The part of the computer that contains the brain or central processing unit is also know as the
mart [117]
The part of the computer that contains the brain is called the motherboard.
3 0
3 years ago
Read 2 more answers
Please Help!
masha68 [24]

Answer:

a. Gesture-based interaction

Explanation:

Artificial intelligence (AI) also known as machine learning can be defined as a branch of computer science which typically involves the process of using algorithms to build a smart computer-controlled robot or machine that is capable of performing tasks that are exclusively designed to be performed by humans or with human intelligence.

Artificial intelligence (AI) provides smarter results and performs related tasks excellently when compared with applications that are built using conventional programming.

Gesture-based interaction is typically used for input commands and uses a mathematical interpretation of human motion. For example, a door that automatically opens when a person pass

6 0
3 years ago
What is the advantage of maintaining a list of keywords while creating a design blueprint?
elixir [45]

Creating a list of keywords and using them throughout your site helps move pages up the ranks of search engines like Bing or Google. They also attract website visitors. Technically, maintaining a list of keywords while creating a webpage is important in search engine optimization.






8 0
3 years ago
Read 2 more answers
Other questions:
  • When u look at a green object through red glass the object will appear
    11·2 answers
  • How do I learn coding??? ​
    5·2 answers
  • Which of the following is not a common network architecture type?
    9·1 answer
  • Which of the following is *not* true about logging user and program actions on a computer?
    10·1 answer
  • You are informed that all the users within the network are unable to access the Internet. You decide to start troubleshooting fr
    12·1 answer
  • Read the following example cover letter: To Ms. March: I was excited to see your opening for a customer support specialist with
    13·1 answer
  • What does the revolver do computer science​
    9·1 answer
  • Please help thank u!!!!!
    13·2 answers
  • Select the correct answer from each drop-down menu. What are the effects of emerging technology? has brought the internet to alm
    10·1 answer
  • When right-clicking an object, a ____ menu appears, which contains frequently used commands related to the object.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!