1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verdich [7]
3 years ago
14

You have been tasked with ensuring that access to certain server managed resources is only available to client devices with TPM

chips and BitLocker file security. What Windows Server role can be installed to automate this check?
Computers and Technology
1 answer:
elixir [45]3 years ago
7 0

Answer:

Device Health Attestation Services

Explanation:

Based on the scenario being described it can be said that the Windows Server role that can be used to automate this check is known as Device Health Attestation Services. This is a role that allows the administrator to automatically check if a device has the required trustworthy BIOS, TPM, or boot software enabled, as well as Bitlocker encryption.

You might be interested in
Select all statements that correctly describe the ramifications of important features supported by modern DBMS.
lara [203]

Answer:  

"Option b and Option d" is the correct option for this question.

Explanation:

In the database, datatype belongs to the information storage medium, which can hold a specific type of value. There are several data types, which is used in database like integer, character, series, floating-point and array numbers, and the rules, that give levels of security to information are known as a security constraints. It may be either developed as rules on integrity, mathematical formalism rules or schematic rules, and other choices were wrong which can be described as follows:

  • In option a, The asserts, which is in any exchange in a database, should only modify the information, that is effected in acceptable ways is called consistency, that's why it is wrong.
  • In option c, The validity and accuracy of the data in the database can not be ensured, that's why it is wrong.
3 0
3 years ago
Compute the bitwise XOR between 10010100 and 11101010.
Contact [7]

Answer:

The resultants bits for two strings are 0111 1110

Explanation:

Given details:

two pair of strings are

10010100

11101010

comparing two pair of strings, then perform XOR operation

Rules to follow for XOR

If both the bits are same then resultant is zero 0 and if bits are different resultant is one

XOR operation:

10010100

11 1 01010

-------------

01111110

The resultants bits for two strings are 0111 1110

8 0
3 years ago
:P 80 points to spare so i guess its free!!!!!!
Naddik [55]

Answer:

Thank you! can i have brainliest please?

Explanation:

5 0
3 years ago
Read 2 more answers
Write a 20 charecter poem! for points! :)
umka21 [38]
The sky was blue
Glistening clouds in the air
For the little boy had no clue
His mother sat him down on the warm chair

There’s some great news
Hitler took over
And they killed off the Jews
The little boy just wanted to show mom his 4 leaf clover
7 0
2 years ago
Read 2 more answers
What are some random fun facts about Technology?
Lana71 [14]

Answer:

i do not know

Explanation:

but it helps to communication

5 0
2 years ago
Other questions:
  • Which sentences in the passage show the preventive measures to avoid data breach?
    9·1 answer
  • What does computer means?
    13·2 answers
  • Which one of the following statements is correct? a. Web browsers cannot function without cookies. b. Cookies are text files and
    9·1 answer
  • What kind of printers tend to have problems with ink drying out inside the nozzles when the printer is not used for a period?
    15·1 answer
  • What are the features of Cobol language that make it suitable for programming business applications.
    6·1 answer
  • How many of the colonists of Jamestown died before they made it to shore, due to the difficult voyage?
    15·1 answer
  • I know I'm asking for a lot. But this is my last question. If we do it I pass my semester. help please.
    15·1 answer
  • (C) Describe about the different types of computer<br> peripherals and memory devices.
    9·1 answer
  • The…..executed simple
    8·2 answers
  • 2. what are the advantages of breaking up a single logical message into a number of fixed-sized packets and then sending each on
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!