1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vitfil [10]
3 years ago
7

Your network consists of three sites and two domains, with some computers from both domains at each site. Each site has certain

security settings that should apply to all computers from both domains when they’re located at the site. What’s the best way to ensure that the correct security settings are applied to the computers at each site?
Computers and Technology
1 answer:
Zinaida [17]3 years ago
3 0

Answer:

Create three GPOs, one for each site, with the appropriate security settings. Apply the GPOs to the corresponding site, and enforce the GPO.

You might be interested in
Which among the following choices is correct based on the two statements listed below? Statement 1: When the lexical analyzer sc
elena-14-01-66 [18.8K]

Answer: d. Statement 1 is an assertion, Statement 2 is the solution.

Explanation:

The Longest Match rule is a rule which states that whichever lexeme is scanned should always be determined on the support of the longest match available among all the tokens which is accessible. The lexical analyzer used should also follow the rules arrangement, where a reserved word, e.g., a keyword, in a language is given priority over the user input.

8 0
4 years ago
Why don’t we need to know and memorize the IP addresses for our favorite websites?
Solnce55 [7]

Because we have the domain name system (DNS). It registers friendly names, e.g., google.com that represent IP addresses. Your computer will consult a DNS service to query the IP address for a domain name you enter, and under-the-hood the connection is made to the IP address.

4 0
4 years ago
All websites with medical information should be considered credible.
larisa [96]
No, this is not true. WebMD is a great example asking you of simple symptoms that you may be facing and your results could present an apparent fatal disease. This constantly scares the population of netizens whenever they would want a quick diagnosis online through these medical information sites. The best solution to your symptoms is to visit your family doctor or a licensed physician who will give you proper diagnosis checking your vital signs and other related information. Do not always trust the internet and the information it gives you as a user you must take the information with discretion before reacting inappropriately. 
3 0
3 years ago
Read 2 more answers
What are some examples and non-examples of digital security?
deff fn [24]

Answer:

Devices such as a smart card-based USB token, the SIM card in your cell phone, the secure chip in your contactless payment card or an ePassport are digital security devices

5 0
3 years ago
Develop a program so that the output will produce the following :
hammer [34]

Answer:

 #include <iostream>

using namespace std;

int main()

{

  float radius = 5.4;

  float circumference = 2 * 3.14 * radius;

  float area = 3.14 * radius * radius;

 

  cout<<"the circumference of the circle is "<<circumference<<endl;

  cout<<"the area of the circle is "<<area<<endl;

  return 0;

}

Explanation:

Include the library iostream for using the input/output instructions.

create the main function and define the variable with value. Then,

use the formula to calculate the circumference and are of circle.

circumference = 2*\pi *radius

area = \pi * radius^{2}

here, choose \pi = 3.14

after that, display the result.

Note: All variable define in float type.

4 0
3 years ago
Other questions:
  • Brad teaches an accounting class, and he created a PowerPoint presentation from a Word outline for his class. This Word outline
    14·1 answer
  • What are some ways social media networks make money from users
    10·1 answer
  • Suppose you are the security manager of a company and one of your goals is to design security mechanisms based on three security
    10·1 answer
  • A prime number is a number that is only evenly divisble by itself and 1.
    12·1 answer
  • What is a series of instructions or commands that a computer follows used to create software
    9·1 answer
  • You are using the grep command, but it is only searching through files in your immediate home directory. What option enables you
    7·1 answer
  • A bagel shop has two locations, one campus location and one downtown location. A random sample of 40 customers at the campus loc
    13·1 answer
  • What is transmission control protocol?
    9·2 answers
  • Where can I watch all harry potter movies for free?
    7·1 answer
  • How does abstraction make programming languages easier to use
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!