When a document repository is down when you attempt to access it, the ISA principle Authentication is being violated. The authentication method is done during the log on phase and is performed by the ISA server which requests certificate. <span>The client then needs to send the appropriate client certificate to the server in order to be authenticated and to have access to the document.</span>
B- find and replace can replace any word in the document with another.
The answer & explanation for this question is given in the attachment below.
Answer:
The blocking system.
Explanation:
In order to avoid servers to replicate with each other, I should configure the blocking system of the first DHCP.
For example, if the first DHCP fails to respond, the second will get in place, however, I have to configure the first system that immediately that the second DHCP starts working, the first blocks its information and use.
By this way, there won´t be any duplicated actions or reponses.