1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jekas [21]
2 years ago
10

Channel logging tokens can be set to all but:________. a. Relaxed b. Strict c. Both versions d. None

Computers and Technology
1 answer:
Rudik [331]2 years ago
4 0

Answer:

c. Both versions

Explanation:

The Windows Remote management has hardening levels that could be set to Relaxed, Strict, or None based on the channel binding token associated with a request. This feature could be automatically found in the system or manually configured to a user's choice.

Relaxed settings mean rejection of channel binding token that are not valid and the acceptance of requests with no channel binding tokens, but which may be susceptible to attacks. Strict settings entail an automatic rejection of invalid channel binding tokens. None settings entail the acceptance of all requests with no protection against credential-forwarding attacks.

You might be interested in
For a typical middle-income family, what is the estimated cost of raising a child to the age of 18?
Alenkinab [10]
In 2017 the estimated cost was $245,340
3 0
3 years ago
Does anyone have game design in connections
kherson [118]

Answer:

1. Code editor

2. Syntax

Explanation:

Through the code editor, you can read through the code and test it. Since you can read as well as write and edit, you can do the troubleshooting quite effectively, and for all this, you only need the code editor.

As far as the set of rules which defines how various symbols are being considered, it is definitely syntax.

Hence, the correct answer for the two is as mentioned in the attachment.

8 0
3 years ago
When you begin typing text, the _________________________ appears on the status bar with an animated pencil writing on paper tha
melomori [17]
Spelling and grammar check icons
3 0
3 years ago
your teacher has accidentally put the wrong names of the students on her excel science results sheet. What method can be used to
Shtirlitz [24]

Answer:

Explanation:

Excel has a built-in function that allows you to type in a word, letter, or number and it will automatically find every one of that entry and replace it with whatever you want. To do this you simply click on Home > Find & Select > Replace and fill out the information. Once the info is completed click Replace All. This shows exactly why it is way better to do these result sheets on the computer as opposed to on a piece of paper, it allows you to automate everything and fix multiple mistakes with a simple button click.

6 0
2 years ago
Which element of the security policy framework requires approval from upper management and applies to the entire organization?A.
Sav [38]

Answer: A) Policy

Explanation:

Security policy framework is the regulations that are links the information security of an organization with the professionals and business .It maintains the responsibilities and documentation with security .

  • Policy is the document containing expectation,importance, requirement and scope of an organization about security .This security plan is high level document that need to be approved by higher management for implementation in company.
  • Other options are incorrect because standard principles, guidelines in form of regulation and procedure is the manner that is not required for to be permitted by higher management for being implemented on the business organization.
  • Thus the correct option is option(A).
8 0
3 years ago
Other questions:
  • Need answers for 11&12. Due today. Thanks.
    14·1 answer
  • Multiple client switches and routers have been set up at a small military base. The network team decided to implement Terminal A
    15·1 answer
  • Which of the following illustrations is depicted in the icon that's used to access Windows Help and Support files?
    13·1 answer
  • Which of the following might an interior designer in the retail industry specialize in?
    9·1 answer
  • What is wrong with the following code?
    11·1 answer
  • PLEASE HURRY!!!!
    8·2 answers
  • ( BRAINLIEST) <br> Name 2 input devices and 2 output devices on a smart phone.
    12·1 answer
  • Describe psychographic differences among the past five generations of Americans that you learned about in this course. What type
    6·1 answer
  • Which type of relationship is responsible for teaching you values and how to communicate?
    9·1 answer
  • Hosts on the Internet have ________ addresses. Group of answer choices both A and B neither A nor B IP data link
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!