1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Otrada [13]
3 years ago
12

You have three users who travel to four branch offices often and need to log on to the RODCs at these offices. The branch office

s are connected to the main office with slow WAN links. You don’t want domain controllers at the main office to authenticate these four users when they log on at the branch offices. What should you do that requires the least administrative effort yet adheres to best practices?
Computers and Technology
1 answer:
liberstina [14]3 years ago
8 0

Answer:

Configure Caching on RODCs using PRP.

Explanation

Read only domain controller is a domain controller that allows active directories for read only purposes. An administrator can setup RODCs for branches of a company and control the domain controller of the database server, updating the database which can be viewed as a read only partition in RODC.

Authenticating users in a RODC rely on the domain controller to forward the credentials to the read only domain controller. This can impose to high traffic on a slow WAN network link, especially when many users are trying to authenticate, resulting to high bandwidth.

To avoid this, credential caching by configuring password replication policy (PRP) on the RODC is vital.  

When PRP is configure on RODC, the user only get to authenticate once, then the user password is replicated and encrypted for subsequent use.

You might be interested in
if a hacker wants to exploit the TCP three-way handshake, what is the most effective way to go about it?
goldfiish [28.3K]

The most effective way to exploit TCP three-way handshake is TCP SYN flood.

  • SYN flood attack is simply a kind of computer attack that begins with 3-way TCP handshake.
  • TCP SYN flood is also called SYN flood and it is a type of distributed Denial of Service (DDoS) attack that uses every part of the normal TCP three-way handshake to eat up resources on the known server and render it non-functional
  • With TCP SYN flood, a hacker can eat up resources of target's computer and makes it unresponsive.

From the above, we can therefore say that the most effective way to exploit TCP three-way handshake is TCP SYN flood.

Learn more from:

brainly.com/question/14739766

7 0
2 years ago
Why can’t I see one individual’s questions in the app through their profile, but I can see their questions on the website?
Mumz [18]

Answer:

I think thats just a software issue. i have the same problem

Explanation:

7 0
3 years ago
Read 2 more answers
Which of the following is the first step in the boot process? Select one: A. The BIOS checks that all devices are operational. B
dalvyx [7]

Answer:

D. The BIOS is activated by powering on the CPU.

Explanation:

The BIOS is activated by powering on the CPU is the first step in the boot process.

5 0
3 years ago
Describe your dreams include lifestyle,job,house,friends
n200080 [17]
So, this is an answer of your choice. What it is trying to ask is tell us what your dream home, job, husband, and so on. For example: My dream home is a mansion in Mississippi by the beach. My dream job is a doctor. Those are prime examples of a dream home and job. Now your answer shouldn't be the same as mine. Your's should be something different. Unless, you want a mansion in Mississippi by the beach and you would like to be a doctor. In other words it is asking you to tell us what you want you home, lifestyle, job, friends, and possibly your DREAM pet. Hope this helps.

3 0
3 years ago
Read 2 more answers
Suppose there are two ISPs providing WiFi service in a café. Each ISP operates its own AP and has its own IP address block. If b
Alinara [238K]

Answer:

As a design rule, access points within range of each other should be set to channel frequencies with minimal signal overlap. Users will find that roaming doesn’t work well, and performance will degrade because of interference between access points.

Explanation:

8 0
3 years ago
Other questions:
  • Vpns create a _____________ to transport information through public communications media.
    8·1 answer
  • How do social media sites illustrate kindness?
    15·1 answer
  • Once I install my secondary hard drive what two tasks need to be done?
    13·1 answer
  • Within the Chart Design tab, which section is used to change the data of a previously created chart?
    12·1 answer
  • Where is permanent data in the computer stored whenever gym starts his laptop He sees some commands in numbers appearing on the
    12·1 answer
  • Hi whats airpods good for
    15·2 answers
  • What simple machine is most often used to lift the blinds on a window?
    8·2 answers
  • Transborder data flow (TDF) restricts the type of data that can be captured and transmitted in foreign countries. True or False
    12·1 answer
  • Which of the following is NOT one of the three main ways to control a program when writing code?
    6·2 answers
  • A block signature indicating that a text message was typed on a mobile device is an example of ____________.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!