1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreyy89
3 years ago
9

EXTRA CREDIT - 1 point! Scenario: A small business has implemented the best way to handle the few Service Accounts they have in

their AD: They use a random password generator to set Service Account passwords, have 1 Service Account per service, and policies are set so that the accounts do not expire. The current passwords are not even stored anywhere. The company rigorously documents this setup, and diligently deprovisions accounts when services configurations change. The company has also implemented Account Monitoring, and know when any of the Service Accounts is being attempted to be used without the correct password, indicating an attack attempt. Due to the security sensitivity of the data accessible via the Service Accounts, any attack attempts will cause the service account to be disabled and IT staff alerted. Finally, the company has implemented a script that can be used to update the existing passwords -- resetting them via the only account delegated this authority: the Enterprise Root account. To ensure none of the IT staff can use the Enterprise Root account to reset a Service Account without consent, the password for the Enterprise Root account is only known to the company's CIO (Chief Information Officer), and is not stored anywhere. Identify (1) one major problem that you can see with this setup, and describe why this is a problem. There are multiple correct answers possible for this EXTRA CREDIT question.
Computers and Technology
2 answers:
Kazeer [188]3 years ago
3 0

Answer:

Windows server 2019 has several new features, but none of them related to Active Directory (AD). Note that there is no Windows Server 2019 AD Forest/Domain Functional Level. But generally it provides several features including desktop experience, System Insights, hybrid cloud ,security etc.

Explanation:

Paladinen [302]3 years ago
3 0

Answer:

A small business has implemented the best CIO:-

Though the setup is well planned but there is another drawback to that setup as the root password is with the company CIO. So, even in case of critical situation, if the CIO is somehow unavailable, the entire business will be inactive as users can't able to logon into the system as it is mentioned the service accounts can only be reset using the ROOT account. There should be other alternatives to this failure.

Explanation:

You might be interested in
What is the benefit of making an archive folder visible in the Outlook folder list?
Rufina [12.5K]

Answer:

a

Explanation:

5 0
3 years ago
HELP 15 POINTS
masya89 [10]

Answer:

A I think I might be wrong

6 0
4 years ago
Read 2 more answers
what is the largest possible number of internal nodes in a redblack tree with black height k? what is the smallest possiblenumbe
Elina [12.6K]

Answer:

A Red Black Tree is a type of self-balancing(BST) in this tree ,each node is red or black colored. The red black tree meets all the properties of the binary search tree, but some additional properties have been added to a Red Black Tree.

A Red-Black tree's height is O(Logn) where (n is the tree's amount of nodes).

In a red-black tree with black height k

The maximum number of internal nodes is 2^{2k} -1.

The smallest possible number is 2^{k} -1.

7 0
3 years ago
Prior to the world wide web as we know it today, the internet was chaotic, without any ____.
atroni [7]
Search engines - there was no single way to ask a question
5 0
4 years ago
HAVE A GOOD WEEK OFF PPL
dexar [7]

Answer:

thanks you too mah dude! :)

Explanation:

7 0
3 years ago
Other questions:
  • How do computers perform complicated tasks built from simple instructions?
    14·1 answer
  • Which of the following things must you do if you are parked on a rural highway?
    8·1 answer
  • How to access files on different computer same network
    14·1 answer
  • Which option is used to apply formatting to multiple objects on a single slide while still maintaining the ability to manage the
    14·2 answers
  • When performing actions between your computer and one that is infected with a virus, which of the following offers NO risk of yo
    11·2 answers
  • "What line of code can be used to provide a convenient way to merge the source code from one file with the source code in anothe
    8·1 answer
  • Evaluate if the following function is a good candidate to be placed in a library. Why or why not?
    10·2 answers
  • To create an SSL connection, a Web server requires a ________, which is an electronic document that confirms the identity of a w
    12·1 answer
  • 5. An external CSS file is saved with D. Answer the following questions. 1. Explain the purpose and advantages of using CSS.​
    7·1 answer
  • When constructing policies regarding data _______________, it is important that these policies offer particular guidance on sepa
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!