1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Otrada [13]
3 years ago
12

You have three users who travel to four branch offices often and need to log on to the RODCs at these offices. The branch office

s are connected to the main office with slow WAN links. You don’t want domain controllers at the main office to authenticate these four users when they log on at the branch offices. What should you do that requires the least administrative effort yet adheres to best practices?
Computers and Technology
1 answer:
liberstina [14]3 years ago
8 0

Answer:

Configure Caching on RODCs using PRP.

Explanation

Read only domain controller is a domain controller that allows active directories for read only purposes. An administrator can setup RODCs for branches of a company and control the domain controller of the database server, updating the database which can be viewed as a read only partition in RODC.

Authenticating users in a RODC rely on the domain controller to forward the credentials to the read only domain controller. This can impose to high traffic on a slow WAN network link, especially when many users are trying to authenticate, resulting to high bandwidth.

To avoid this, credential caching by configuring password replication policy (PRP) on the RODC is vital.  

When PRP is configure on RODC, the user only get to authenticate once, then the user password is replicated and encrypted for subsequent use.

You might be interested in
When constructing policies regarding data _______________, it is important that these policies offer particular guidance on sepa
Rama09 [41]

Answer:

access

Explanation:

Managing users' access rights to digital resources within the organization's environment is a fundamental SoD control. As more services are requested by users, utilizing the built-in panels to check compliance with internal controls might become excessive. Companies require a comprehensive Identity Governance and Administration plan to monitor these user access and offer an authoritative source of identity definitions in order to ensure  SoD compliance.

6 0
2 years ago
Just answer in five-line. Question:
Eddi Din [679]

Answer:

It is a half-duplex serial transmission mode, and this can be provided through the RS-485 two wired electrical interface. And this can be connected to the ethernet if required, connect to the LAN, and finally transmitting the video footage to all the screens. And the two reasons are:

1. Noiseless

2. Allows around 32 receivers.

Explanation:

Please check the answer.

3 0
3 years ago
What is the main difference between a literacy society and a digital Society
EleoNora [17]
The accurate answer is

The difference is a Literacy Society is a program for encouraging people to read.
A Digital Society is a program that as to do with technology at work,school, or at home.

Glad to help :) 
7 0
3 years ago
Conner has located a research source that is sponsored by a pharmaceutical company. Based on the sponsorship, Conner must be car
gogolik [260]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer is:

Conner has located a research source that is sponsored by a pharmaceutical company. Based on the sponsorship, Conner must be careful that the information is not <u>Biased.</u>

<u></u>

When you evaluate and use information from multiple sources, you need to evaluate the information that it must be error-free and not biased and it should be accurate information as you needed.

As in this example, Conner needs to research that the information should not be biased because the information or research source is sponsored by a pharmaceutical company and there is chances of biasedness. So, Conner must be careful that information is not biased.

6 0
3 years ago
What is processing for a computer?​
iogann1982 [59]

Answer:

is an action or series of actions that a microprocessor, also known as a central processing unit (CPU), in a computer performs when it receives information.

5 0
3 years ago
Other questions:
  • Write an original idiom that uses the word dog or dogs im in 4th
    5·2 answers
  • Budgets help you to do all of the following expect
    15·2 answers
  • Which of the following types of network can only be accessed by members within a private organization?
    5·1 answer
  • Bobbi owns a protein shake company, which has been trading for 3 years. Her products are stocked in a number of gyms, but the co
    11·1 answer
  • A firm can survive and succeed in the long run if it successfully develops strategies to confront the _______________ that shape
    9·1 answer
  • Marie has never used a word processor. In 3 to 4 sentences, describe how she could benefit from using a word processor to comple
    7·2 answers
  • What is wrong with the following C++ code? How would you fix it? int sum; for (int i=0; i&lt;1000; ++i) sum += i; { printf("Sum
    5·1 answer
  • What is a command-line program?
    8·2 answers
  • Kenny is asked to submit a photo for the annual photographic competition. He decided to capture a photo with the light-painting
    15·1 answer
  • There is overlap in the subjects of study in the different information technology disciplines.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!