1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gre4nikov [31]
3 years ago
14

A GPO component that’s an Active Directory object stored in the System\Policies folder. The GPC stores GPO properties and status

information but no actual policy settings is called___________.
Computers and Technology
1 answer:
blagie [28]3 years ago
8 0

Answer:

The correct answer to the following question will be the Group Policy Container (GPC).

Explanation:

Group Policy Container (GPC) : An active directive container that contains properties of GPO (such as the setting of GPO, it's component settings), is known as Group Policy Container.

There are two locations where GPO stores its configuration information :

  • Group Policy Container (GPC).
  • Group Policy Template (GPT).

You might be interested in
Which of the following option is not available in Insert>>Picture?
zysi [14]

Answer:

Word art

Explanation:

its copy and paste

7 0
3 years ago
Read 2 more answers
A rootkit is software and file folders that are hidden from view and permit viruses, spyware, and malware to be installed on a P
Zanzabum

Answer:

TRUE

Explanation:

A rootkit is a collection of computer software, typically malicious, that is designed to grant an unauthorized user access to a computer or certain programs. Once a rootkit is installed, it is easy to mask its presence, so an attacker can maintain privileged access while remaining undetected.

Rootkit detection is difficult because a rootkit maybe able to subvert the software that is intended to find it.

Rootkits work by using a process called modification (the changing of user account permissions and security).

Rootkits are not malware themselves, but rather a process used to deploy malware on a target.

Therefore, it is TRUE that a rootkit is software and file folders that are hidden from view and permit viruses, spyware, and malware to be installed on a PC without the knowledge or consent of a user.

3 0
3 years ago
Which can be used to plan a program?
Marina86 [1]

Answer:

Pseudocode.

Hope this helps you...

Explanation:

8 0
4 years ago
Read 2 more answers
Can someone tell me how to mark people the brainiest on a laptop?
Crazy boy [7]

When two people give answer to your question, then below their answer you will get a option Mark as Brainliest. You simply need to click that button

7 0
3 years ago
Which type of document would be best created in Word? HELLP!!!!
bekas [8.4K]
I think it’s presentation.
Like if I am right.
8 0
3 years ago
Read 2 more answers
Other questions:
  • Which type of system must you connect to and use to make changes to Active Directory?
    15·1 answer
  • Which of the following statements is true of a database? a. It is a collection of unstructured data. b. It is accessed primarily
    14·1 answer
  • Smartart and shapes are useful tools because they allow you to
    10·1 answer
  • Write a statement that terminates the current loop when the value of the int variables x. and y.are equal
    12·1 answer
  • Give three facts about the history of the train shongololo
    9·1 answer
  • Put these steps for managing your study time in chronological order. 1 set aside the same time each day 2 Identify the best time
    14·1 answer
  • Describe the dynamic Network Address Translation (NAT).
    9·1 answer
  • Why is failure important when you are designing a solution to a problem?
    6·2 answers
  • Siapa mahapatih brainly.com atau yg disebut Brainly Amerika Serikat ?​
    5·1 answer
  • Three reasons Why we connect speakers to computers
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!