1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dennis_Churaev [7]
3 years ago
15

A user logs into Active Directory on a workstation and the user home directory does not redirect to a network share on a file se

rver. A technician suspects that the group policy setting is incorrect. Which command can the technician use to verify the group policy settings?
Computers and Technology
1 answer:
inysia [295]3 years ago
6 0

Answer:

gpresult

Explanation:

Group Policy provides the system administrator with settings that would be necessary to manage the different user accounts available in an organization. It also controls their work environment centrally by configuring the user Operating System (OS), applications and user accounts.

Group policy settings or configurations are referred to as Group Policy Objects (GPOs). These objects can be linked to organizational units (OUs), domains or sites.

There are various group policy commands such as;

  1. rstrui (System Restore tool will run),
  2. runas (using different permission to run a tool or program),
  3. tasklist (currently running programs are shown
  4. gpupdate (Group policies are refreshed)
  5. gpresult (group policy configurations are displayed for verification)

gpresult command can be used to verify the group policy configurations for adjustment or optimization. The technician can start troubleshooting from viewing the active settings, then running the rstrui to start the System Restore utility to restore the computer to an earlier date

You might be interested in
Trent works as a correspondence clerk. Which technical skill is essential for him to perform his job?
anyanavicka [17]

Answer:

<em><u>keyboarding </u></em><em> </em><em>is</em><em> </em><em>essential</em><em> </em><em>for</em><em> </em><em>him</em><em> </em><em>to</em><em> </em><em>perform</em><em> </em><em>his</em><em> </em><em>job</em><em>.</em><em> </em>

4 0
3 years ago
The use of technology to observe a user's actions often without the user's knowledge is known as:
Margaret [11]

Answer:

C

Explanation:

Computer surveillance refers to spying that allows the viewer to gain access of all activity on the given computer.

5 0
3 years ago
What is a current trend in ERP systems?
motikmotik

Answer:

cloud per

Explanation:

because it still is continuing to rise till the very day. It is now become generally accepted with most epr systems

5 0
3 years ago
How much memory is reserved for a function template?
emmasim [6.3K]
None by default, instructions for the function are only generated by the compiler if such a function is actually called in any one possible control path
7 0
3 years ago
What is a main benefit of using Search Audience solutions?a. They identify ad extension opportunities to improve average click-t
uranmaximum [27]

Answer:

Option C is correct.

Explanation:

The biggest advantage of utilizing Search Audience solutions is that they will ultimately deliver the best response to the best client for the appropriate offer. Effective Google Advertising projects continually focus on customer feedback to meet the best possible users through the appropriate advertisement at the appropriate moment.

So, the following are the reason that describes the other options are not appropriate according to the scenario.

6 0
3 years ago
Other questions:
  • Can you help please.
    11·1 answer
  • To employ an access key, press and hold down the ____ key as you tap the access key.
    14·1 answer
  • In the RGB model, which color is formed by combining the constituent colors?
    14·2 answers
  • COMPUTER FUNDIMENTAL HELP 15 POINTS!! RESEND IT
    7·2 answers
  • A _______________ is software that can guess passwords.
    5·1 answer
  • A relative path name defines a path from_________________________ Select one: a. from the UFD (user file directory) b. the curre
    6·1 answer
  • Fuction table of JK-Flip flop?
    11·1 answer
  • Does any body know the name of this sensor? ​
    11·1 answer
  • Cú pháp câu lệnh xóa thủ tục
    12·1 answer
  • Favorite friends character and why GO!
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!