1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana [24]
2 years ago
12

You are network administrator for an Active Directory forest with a single domain. Then network has three sites with one domain

controller at each site. You have created and configured sites in Active Directory Sites and Services, and replication is operating normally between sites. You configure two universal groups for use in securing the network. All users are members of one universal group or the other. After configuring the universal groups, users at sites 2 and 3 report slows login and slow access to the corporate database. Users at site 1 can log in and access the corporate database with acceptable performance. You want to improve login and resource access performance for users in sites 2 and 3. What should you do?
Computers and Technology
1 answer:
Alina [70]2 years ago
4 0

Answer: Enable universal group membership caching at sites 2 and 3

Configure the domain controllers at sites 2 and 3 as global catalog servers

Explanation:

Since the user wants to improve login and resource access performance for users in sites 2 and 3, then a universal group membership caching ashould be enabled at sites 2 and 3.

Also, the domain controllers at sites 2 and 3 should be configured as global catalog servers. This is required for authentication and the resolution of the user principal name. This can be used in ensuring that login is improved for the users.

You might be interested in
How were images captured before the invention of the camera?
xeze [42]

Answer:

The British inventor Fox Talbot produced his first successful photographic images in 1834, without a camera, by placing objects onto paper brushed with light-sensitive silver chloride, which he then exposed to sunlight.

Explanation:

5 0
2 years ago
What is the correct sequence of the phases in the systems development life cycle?
HACTEHA [7]
1. Requirements gathering/analysis.
2. Design.
3. Development.
4. Testing.
5. Maintenance.
7 0
3 years ago
5. Why is adaptability important in the workplace?
vesna_86 [32]

Answer:

because u can adapt a job

Explanation: hmmhmhmmhmhmhmmhhm

THIS HELPS RIGHT??????

8 0
3 years ago
What is computer? what are the major function of computer​
Naya [18.7K]

Answer:

A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations automatically. Modern computers can perform generic sets of operations known as programs. These programs enable computers to perform a wide range of tasks.Computers are used to control large and small machines which in the past were controlled by humans. Most people have used a personal computer in their home or at work. They are used for things such as calculation, listening to music, reading an article, writing etc.

Computers are used at homes for several purposes like online bill payment, watching movies or shows at home, home tutoring, social media access, playing games, internet access, etc. ...

Medical Field. ...

Entertainment. ...

Industry. ...

Education. ...

Government. ...

Banking. ...

Business.

BRAINLIEST PLEASE

7 0
2 years ago
What is the primary limitation of free versions of antivirus applications
ddd [48]

Answer:

Please look below for the answer

Explanation:

The primary limitation is that they don’t protect in real time. They also only perform quick scans which is not that efficient. They cannot scan the Windows directory. They only install on 64-bit operating systems

Hope I helped pls mark as brainliest

3 0
3 years ago
Other questions:
  • 2. Write the binary representation of number 1037.379 in IEEE 754 standard in single precision. Express the result in binary, oc
    7·1 answer
  • Using a pin or password in addition to tpm is an example of what type of authentication?
    13·1 answer
  • If you’re paid hourly and work 40 hours in one week how much overtime have you worked? 8 hours none $48 or $80
    9·2 answers
  • How would you justify using cloud computing?
    12·1 answer
  • Define a function UpdateTimeWindow() with parameters timeStart, timeEnd, and offsetAmount. Each parameter is of type int. The fu
    10·1 answer
  • Draw a datapath that can perform the following set of register replacement and combinational operations. Assume all registers ar
    5·1 answer
  • Which comparison operator is valid for greater than or equal to?<br><br> &gt;<br> &gt;=<br> =&gt;
    5·1 answer
  • Do you guys know if there's a way for me to find a Google doc that I typed but forgot to save if you do it for points i will rep
    10·2 answers
  • Example of Bandwidth Analogies: using Pipe
    11·2 answers
  • Complete the sentence based on the given information.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!