1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Helga [31]
3 years ago
15

What tool do windows server administrators use to create and manage user accounts?

Computers and Technology
1 answer:
AVprozaik [17]3 years ago
8 0
Windows settings. 
1234567890
You might be interested in
Portable Document Format is a proprietary document file type created by Adobe Systems that is compatible with most computer syst
Lyrx [107]

Answer: PDF

Explanation:

6 0
3 years ago
The D:\ drive in your computer has been formatted with NTFS. The Mary user account has been assigned the following permissions:
Softa [21]
A deny full control to both , because Mary had to have both files or denied full control
3 0
3 years ago
You want to transfer a document from one computer to another, and you want the document to be encrypted. The destination compute
Alex_Xolod [135]

Answer:

Check the explanation

Explanation:

This document transfer ought to work smoothly. Due to the IEEE standards and Principles, the presentation layer is expected to encrypt/decrypt the data on both part of the network. The session layer creates a mutual coordination among the applications while the transport layer is there to ensures delivery. Immediately the segments hit the network, routers control and handle the routing process of the packets to the distant end. Layers 6, 3 & 1 are straightly involved in the italicized parts of the question; however, the entire layers play a role when looking at the transfer as a whole.

5 0
3 years ago
The dashboard for the WebFOCUS BI platform in the Travel and Transport case study required client side software to operate. True
Elina [12.6K]

Answer:

True

Explanation:

The WebFOCUS is a platform with the BI and analytics that can be used as an application tool for business transactions and reports. Different kinds of professionals such as those in management or analysis as well as customers could use the platform. Based on the statement provided in the question, the answer is true.

6 0
4 years ago
Explain what a honeypot is. In your explanation, give at least one advantage and one disadvantage of deploying a honeypot on a c
tatuchka [14]

Answer:

A honeypot is a computer network set up to act as a decoy to track, deflect, or research trying to obtain unwanted access to the information system.

Explanation:

A honeypot is a device or device network designed to imitate possible cyber-attack targets. It can be utilized to detect or deflect assaults from a legitimate military target. It may also be used to collect knowledge on how cybercrime works.

<u>Advantage:- </u>

  • Data Value:- One of the challenges faced by the research community is to obtain meaning from big data. Companies hold large quantities of data daily including firewall logs, device logs, and warnings for vulnerability scanning.
  • Resources:- The problem facing most protection systems is resource shortages or even the depletion of resources. Power saturation is when a protection asset can no longer work since it is overloaded by its assets.
  • Simplicity :- I find simplicity to be the biggest single strength of honeypots. No flashy techniques are to be created, no stamp computer systems to be managed, no rule units to be misconfigured.

<u>Disadvantage:-  </u>

That honeypot doesn't replace any safety mechanisms; they just operate with your overall security infrastructure and improve it.

4 0
4 years ago
Other questions:
  • Alex has started a Google Search campaign designed to promote his online motorcycle accessories store. His store focuses on cust
    6·1 answer
  • The main differences between laptops and desktop computers other than size and portability.
    14·1 answer
  • If everyone's choice for their computer printer were an hp laserjet 4100, there would be a ___ preference segment in the compute
    8·1 answer
  • Once you record your audio and click ok to save it what happens to the recording?
    9·1 answer
  • Can you call a mobile a computer. It Yes<br>why? If No why​
    7·2 answers
  • Why is it important to try to make financial decisions without emotions.
    12·2 answers
  • In an all-integer linear program,
    10·1 answer
  • 1i) Standardize 'weight' column Write a function named standardize_weight that takes in as input a string and returns an integer
    14·1 answer
  • What is the final step when creating an appointment to ensure that the content of the appointment is stored in Outlook?
    13·1 answer
  • What 3 types of data can be entered in a spreadsheet
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!