1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kogti [31]
3 years ago
11

You are the head of the corporate security department, and the Microsoft teamhas asked you for some assistance in setting the pa

ssword controls on their new stand-alone server.
Which Administrative Tool should you use to configure these settings?

a. Active Directory Users and Computers

b. Computer Management

c. Security Service

d. Local Security Policy
Computers and Technology
1 answer:
IgorC [24]3 years ago
6 0

Answer:

d. Local Security Policy

Explanation:

Local security policy refers to different security settings that are present on a local computer. Local security policy can include administrative rights assignments and password.

This can also mean policies that enables an administrators to set users privileges by so doing guiding what users are permitted to do on the computer.

You might be interested in
What is the function of the kernel of an operating system? It is an application that allows the initial configuration of a Cisco
Phoenix [80]

Answer:The kernel provisions hardware resources to meet software requirements.

Explanation: Kernel is the program which behaves as the central component of the operating system.The main purpose of the kernel is to control the operation of the system to manage it.

Monolithic kernel and micro-kernel are two types of kernel units present in the computer system where they work for fulfilling the software requirement by attaching it to the hardware parts.

Other option are incorrect because it does not work for Cisco device, does not perform any specific feature only , no linkage is created between the hardware and the electronics nor reacts as navigation bar.

3 0
3 years ago
__________ requires unbiased and careful questioning of whether system elements are related in the most effective ways, consider
Liono4ka [1.6K]

Answer:

The answer is "Critical analysis".

Explanation:

Critical analysis is a part of the operating system, that provides an analysis, which is used to process all bits in a system and run their computer system more efficiently.

  • This analysis is used in contextual writing because It reflects the author's interpretation or perception of the text.
  • This analysis hosts vulnerabilities in current desktop operating systems objectively.
5 0
3 years ago
De dónde proviene la mayoría de cosas que utilizamos en el hogar​
Mashutka [201]

Answer:

La mayoría de las cosas que utilizamos en el hogar proviene de distintas industrias ubicadas a lo largo y ancho del mundo, dado que vivimos en un mundo globalizado e industrializado, en el que las distintas naciones intercambian bienes y servicios a través del comercio internacional.

De esta manera, en los distintos hogares hay cosas de diversos orígenes, como electrodomésticos provenientes de China, Japón o los Estados Unidos, muebles provenientes de México o Suecia, alimentos provenientes de Argentina, etc.

7 0
2 years ago
Enterprise software is designed for organizations to __________.
klemol [59]

Answer:

The goal of enterprise software is to enable the activities of large organizations, supporting a wide range of different user roles.

6 0
2 years ago
You downloaded a picture that a friend sent you on social media, but when you opened it, you noticed that another unfamiliar pro
solmaris [256]

Answer:

Malware.

Explanation:

3 0
2 years ago
Other questions:
  • In hunter-gather societies most hunting was done by
    9·2 answers
  • A(n) ____ tag is used to let the compiler know that your intention is to override a method in a parent class
    10·1 answer
  • "what is the #1 resource used when researching a product online?"
    5·1 answer
  • Computers store temporary Internet files in the Recycle Bin. These files take up space and slow down a computer. Which tool can
    10·1 answer
  • Assume that input file references a Scanner object that was used to open a file. Which of the following while loops shows the co
    6·1 answer
  • USDA-APHIS Animal Care Resource Policy #12 "Considerations of Alternatives to Painful/Distressful Procedures" states that when a
    11·1 answer
  • Head-mounted displays often use organic light emitting diode,or technology.
    15·1 answer
  • _____ creates a border or space that separates information.
    14·1 answer
  • If the algorithm does not have instructions for unanticipated results, the computer program will
    15·1 answer
  • Assessment
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!