1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ymorist [56]
3 years ago
8

Your network consists of a single Active Directory domain. Your company has recently merged with another company. The acquired c

ompany has an Active Directory network with multiple domains. All domain controllers in both forests run Windows Server 2008 R2 or Windows Server 2012 R2. You have been given the task of recommending changes to the Active Directory structure.
You want to let users in both companies access each other's resources (subject to applicable permissions), and you want to minimize administrative effort in doing so.
What should you do?
a. Create two one-way external trusts between your domain and each domain in the newly acquired company.
b. Create two one-way external trusts between the two forest root domains.
c. Create a two-way external trust between the two forest root domains.
d. Create a two-way shortcut trust between your domain and each domain in the newly acquired company.
e. Create a two-way forest trust between the two forest root domains.
f. Create a one-way forest trust between the two forest root domains.
Computers and Technology
1 answer:
solmaris [256]3 years ago
6 0

Answer:

Option E is correct.

Explanation:

While the user's server forms of the specific domain Active Directory. His corporation also partnered with some firms recently. The obtained corporation seems to have a multi-domain Active Directory server for both areas, both domain operators use the following Windows Servers. This was assigned the responsibility of proposing improvements to the Active Directory system.

He needs users of all corporations will gain exposure with each other's services, however, he wants to reduce logistical activity to achieve. Thus, he would build a two-way forest relationship between both the two roots forest domains.

You might be interested in
The user cannot use a computer system without.................... software<br><br>​
zheka24 [161]

Answer:

the user cannot use a computer system without hardware and software

4 0
3 years ago
Read 2 more answers
WILL GIVE BRAINLIEST TO HELPFUL ANSWERS!
sashaice [31]

Algorithm is part of computer science. You an learn it on Khan academy. (you probably werent looking for this but no one was answering)

7 0
3 years ago
Which invention provided instant communication and information to a massive audience for the first time?
igor_vitrenko [27]
B. Television. It provided <span>instant communication and information to a massive audience for the first time in 1927.

Hope this helps :)</span>
4 0
3 years ago
Read 2 more answers
Explain the difference between file and folder (in your own words)
denpristay [2]

Answer:

the difference is one is online and one is not

Explanation:

A file is usually what you find online. And a folder is what you put papers into.

7 0
3 years ago
You need to protect sensitive files from unauthorized users even if the disk is stolen. What feature should you use and on what
Lynna [10]

Answer:

EFS on NTFS

Explanation:

EFS (Encryption File System) allows users to store confidential information about a computer when people who have physical access to your computer could otherwise compromise that information, intentionally or unintentionally. EFS is especially useful for securing sensitive data on portable computers or on computers shared by several users.  An attacker can also steal a computer, remove the hard drive(s), place the drive(s) in another system, and gain access to the stored files. Files encrypted by EFS, however, appear as unintelligible characters when the attacker does not have the decryption key.

The Encrypting File System (EFS) that is included with the operating systems provides the core file encryption technology to store NTFS files encrypted on disk.

7 0
3 years ago
Other questions:
  • A communications system connecting two or more computers is called a(n) ________.
    7·1 answer
  • ____ data exist in a format that does not lend itself to processing that yields information.
    8·1 answer
  • What can web designers use to control the individual web page layouts for all of the pages on a website?
    7·1 answer
  • Consider the following declaration: double[] sales = new double[50]; int j; Which of the following correctly initializes all the
    11·1 answer
  • Your traffic light changes to yellow as you approach an intersection. In most cases, what action should you take?
    15·2 answers
  • There are many modes of remote visual communication. which is the most common mode
    5·1 answer
  • write a program in C# that reads a set of integers and then finds and prints the sum of the even and odd integers?​
    12·1 answer
  • Need answer ASAP plz
    8·1 answer
  • Suppose that you set the application-level environment setting for the current workspace to store all your data in the same geod
    7·1 answer
  • Write a FOR loop that displays the following numbers exactly like this (you must use a loop):
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!