1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kogti [31]
3 years ago
11

You are the head of the corporate security department, and the Microsoft teamhas asked you for some assistance in setting the pa

ssword controls on their new stand-alone server.
Which Administrative Tool should you use to configure these settings?

a. Active Directory Users and Computers

b. Computer Management

c. Security Service

d. Local Security Policy
Computers and Technology
1 answer:
IgorC [24]3 years ago
6 0

Answer:

d. Local Security Policy

Explanation:

Local security policy refers to different security settings that are present on a local computer. Local security policy can include administrative rights assignments and password.

This can also mean policies that enables an administrators to set users privileges by so doing guiding what users are permitted to do on the computer.

You might be interested in
1. The goals of the Safety Office of the Department of Transportation include______.
Lesechka [4]
The correct answer is D
5 0
3 years ago
Computer forensics is practiced _____. A. Only by specially trained government and law-enforcement personnel B. By many organiza
laiz [17]

Answer:

Option B is the correct answer.

<h3>Computer forensics is practiced by many organizations, including public- and private-sector organizations such as hospitals, law enforcement, and businesses. </h3><h3 />

Explanation:

Computer forensics can be defined as a branch of digital forensics that deals with the evidences and and proofs found on all digital storage media such as computers.

It is basically a step for enhancing security bases of communication. Therefore it is mainly used by law-enforcement personnel but it can also be practiced by other institutions for the purpose of self security.

<h3>I hope it will help you!</h3>
4 0
3 years ago
What would you enter at the command prompt to start a new bourne again shell session?
butalik [34]

The answer is bash . The bash command opens a Bourne-again sheel (bash) session. It is the standard shell used in most Linux computers and it uses commands similar to a UNIX shell. Bash includes features such as:

1) Command completion when pressing the tab key.

2) Command history.

3) Improved arithmetic functions.

6 0
3 years ago
True or False
krok68 [10]

I think that the answer is false. But I'm not sure.Let meknow if I'm right.

8 0
3 years ago
Read 2 more answers
Which of these is a consistent periodic pulse separated into equivalent intervals of time?
Art [367]
My answer would be B. beat
6 0
3 years ago
Read 2 more answers
Other questions:
  • A system of interlinked documents that are available on the internet is
    5·1 answer
  • Ron wants to install an energy efficient and long lasting device for lighting in his new home. Which device should he use?
    11·2 answers
  • What are availabilities and uses of solar energy/panels? (please explain as much as you can)
    8·1 answer
  • Fill in the code to complete the following function for computing a Fibonacci number. public static int fib(int index) { if (ind
    6·1 answer
  • If you are asked to list your favorite websites in no particular order, you are relying on
    8·1 answer
  • What can provides access to the only menu in office 2007​
    13·1 answer
  • Given the 32-bit binary number:
    13·1 answer
  • Mike gets along with his co-workers and is always helpful to the clients. He demonstrates good _____.
    7·2 answers
  • How todraw a status bar​
    9·1 answer
  • Consider rolling a 6-sided die. The outcome of interest is the number of dots that appears on the topside when the die stops rol
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!