1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
malfutka [58]
3 years ago
13

You have just installed two new Linux servers to handle a new application. You want to integrate user authentication between Lin

ux and your existing Windows Server 2012 R2 domain controllers. What can you do?
Computers and Technology
1 answer:
Svetach [21]3 years ago
3 0

Answer:

Create a realm trust  is the correct answer to the following question

Explanation:

<u><em>Steps to create realm trust:</em></u>

  • Firstly, you have to open your windows then click, on the start menu  then, you click on the Administrative tool then you found Active directory Trust and Domain.
  • Then, there is the console tree, then click the right button of you mouse on the domain and click on the properties.
  • Then, Trust tab appears and you have to click on the new Trust and then next.
  • Then, Trust name page appears and you have to type the name of the realm for aim the realm.
  • Then, Trust type page appears and you have to select the option of the realm trust and then next.
  • Finally, in the Transitivity Type, you have to select your own type and then in the page of Direction of trust you have to select you direction of your own desire. Then, you have to follow the instructions.
You might be interested in
You just received a message from the internet which was encrypted with asymmetric encryption. what do you need to do to read the
Bezzdna [24]
Assuming the data was encrypted with YOUR public key, you'll need YOUR private key to decrypt it. That's answer e.

a and b are not solutions by themselves, of course you need to use the decryption algorithm, but a key goes with it.

c would be about symmetric encryption, but this is asymmetric, so different keys are used for encryption and decryption

d is possible, but it would mean anyone can decrypt it (after all the key is public), so then there's no point in encrypting it in the first place.

So e is the only logical answer.
5 0
3 years ago
Which of these skills are used in game design?
olasank [31]

Answer:

I think the answer is Writing but am not sure

8 0
3 years ago
my homework guides Write the definition of a method printDottedLine, which has no parameters and doesn't return anything. The me
Masteriza [31]

Answer:

   public static void printDottedLine(){

       System.out.print(".....\n");

   }

Explanation:

This method returns nothing so its return type is void

It also accepts no parameters so the argument list is empty

When called it executes the  System.out.print(".....\n"); which prints out 5 dots

See a complete program below:

public class TestClock {

   public static void main(String[] args) {

   printDottedLine();

   }

   public static void printDottedLine(){

       System.out.print(".....\n");

   }

}

8 0
3 years ago
How do I cancel a friend request?
dusya [7]

Answer:

By pushing cancel

Explanation:

It's simple

3 0
3 years ago
Read 2 more answers
Which of the following careers is part of the Printing Technology pathway?
torisob [31]
Textile designer i think

6 0
3 years ago
Other questions:
  • If you use a surrogate key, you must ensure that the candidate key of the entity in question performs properly through the use o
    5·1 answer
  • Suppose two computers (A &amp; B) are directly connected through Ethernet cable. A is sending data to B, Sketch the waveform pro
    9·1 answer
  • Why is driving a privilege?
    15·2 answers
  • Host A is sending Host B a large le over a TCP connection. Assume Host B has no data to send Host A. Host B will not send acknow
    14·1 answer
  • The term computer ________ is used to describe someone who is familiar enough with computers to understand their capabilities an
    12·1 answer
  • Which command provides the source refrence at the bottom of the current page of a document?
    5·1 answer
  • The Status bar is used to control the majority of the drafting settings in AutoCAD
    13·1 answer
  • Design the logic for a program that allows a user to enter 20 numbers, then displays each number and its difference from the num
    13·1 answer
  • Wearables, video playback and tracking devices can help athletes because
    15·1 answer
  • in the future, mobile technologies are expected to be used more than desktop computers today. what other improvements are helpin
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!