1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vitfil [10]
3 years ago
7

Your network consists of three sites and two domains, with some computers from both domains at each site. Each site has certain

security settings that should apply to all computers from both domains when they’re located at the site. What’s the best way to ensure that the correct security settings are applied to the computers at each site?
Computers and Technology
1 answer:
Zinaida [17]3 years ago
3 0

Answer:

Create three GPOs, one for each site, with the appropriate security settings. Apply the GPOs to the corresponding site, and enforce the GPO.

You might be interested in
unittttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttt
alukav5142 [94]
What the hell is the point of this, just to waist people's time?
5 0
3 years ago
A restaurant buys a pizza oven that is 4.5 feet long, 5 feet wide and 6 feet tall. What is the volume of the pizza oven?
torisob [31]

Answer:

135 as 4.5 times 5 times 6 gives you the volume and it =135

4 0
3 years ago
Learning from and working collaboratively with individuals is being literate in which area
solniwko [45]
I think it should be civic literacy
7 0
3 years ago
Read 2 more answers
What is the proper way to name the range of cells located in colum A row 3 through colum C row 7?
LenKa [72]

Answer:

it is C

Explanation:

6 0
3 years ago
Read 2 more answers
Look at the following list of peripheral items and determine what type they are: mouse, keyboard, webcam, microphone. Input Outp
-Dominant- [34]

Keyboard and mouse are input/output

Webcam and microphone are audio/visual


6 0
3 years ago
Other questions:
  • ________ is a password-cracking method wherein the attacker compares passwords to lists of common words.
    12·1 answer
  • Martha wants to invite her coworkers to her birthday party. She uses the mail merge feature to compose and send the invitations.
    6·1 answer
  • CNG and gasoline-powered vehicles use the same internal combustion engine, but different fuel types. A) True B) False
    8·2 answers
  • You have a chart that shows 100 data points and you've circled the highest value. Which of the following are you using?
    9·2 answers
  • When _______ wordart, you need to consider both the font size of the text and the size of the text box that contains wordart?
    15·1 answer
  • PLEASE HELP!!!!!!!!!
    8·1 answer
  • Edhesive in JAVA Write a method that takes a String parameter. If the String has a double letter (i.e. contains the same letter
    13·1 answer
  • What is analog computer? where is it used​
    6·2 answers
  • The bullet points above describe _____.
    7·1 answer
  • What programming language has dominated scientific computing over the past 60 years?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!