1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikolay [14]
2 years ago
13

You have installed Windows Server 2016 on a new server and want to centralize user logons and security policies. What type of so

ftware should you install and configure on this server
Computers and Technology
1 answer:
shusha [124]2 years ago
3 0

Answer:

Directory Service

Explanation:

You might be interested in
What is the smallest colorable area on a display device
n200080 [17]
The smallest colorable area on a display would be a pixel 

8 0
3 years ago
Fredrico has to lead a training for his company. He wants to include a visual element to help engage his audience. What type of
andreyandreev [35.5K]
Presentation software is probably his best option. It would allow him to present visual and audio supplements to his audience.
8 0
3 years ago
Read 2 more answers
A class car and its subclass bmw each have a method run(), which was written by the developer as part of the class definition. i
krok68 [10]

The answer is : the run() method defined in BMW will be called.

run() BMW

5 0
3 years ago
Anyone who play online game drop your name​
aleksley [76]

Answer:

kevinj720

Explanation:

4 0
3 years ago
_____________is the act of protecting information and the systems that store and process it.A.Information systems securityB.Poli
mylen [45]

Answer:

A. Information System Security (ISS)

Explanation:

Information System security is a very important security in any organization.

The main focus of Information system security is the system itself and the information that the system possesses, processes and stores.

Information system security, or infosec for short, is the modality involved in protecting information and in making it available.

With Infosec,

1. an organization's ability to perform is protected

2. the data an organization uses is protected ensuring integrity

3. programs, applications and technology implemented on an organization's systems are safely used.

Hope this helps!

3 0
2 years ago
Read 2 more answers
Other questions:
  • Why do we need the Domain Name System (DNS)? Given the domain name www.flamingflamingos.eu, what is the top level domain in this
    5·1 answer
  • Is it ok to give a website your zip code?
    12·1 answer
  • What is the type of person of personal computer which is also called a laptop computer?
    8·1 answer
  • You are tasked with creating a mileage calculator to calculate the amount of money that should be paid to employees. The mileage
    5·1 answer
  • Which item best describes fiber optic transmission?
    14·1 answer
  • Question #2
    8·2 answers
  • Not a subject question but please help
    14·2 answers
  • Can you predict what changes will come to data storage in the next decade? 
    12·1 answer
  • Different the policies and protocols in the industry
    13·1 answer
  • Help fast pls
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!