You can use this group scope to grant permissions for accessing resources in any domain in the forest

a. Global group
b. Domain global group
c. Universal group
d. Universal global group


C. This can be done either directly or by adding the group to domain local groups in other domains.

Computer Science & Information Technology

You might also like to view...

Which of the following statement about JavaSpaces is false?

a) A JavaSpaces service is a Jini service. b) Objects in a JavaSpaces service belong to a particular client. c) Multiple processes can access a JavaSpaces service concurrently. d) An object stored in a JavaSpaces service will remain in the service until its lease expires or until a program removes the object from the JavaSpaces.

Computer Science & Information Technology

The item numbered 3 in the accompanying figure is the ____.

A. mini calendar B. Calendar folder C. Navigation Pane D. Calendars list

Computer Science & Information Technology

A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The coworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls, but can’t remember which tab to use.   Which of the following tabs will you suggest to the coworker?

A. Security tab B. Privacy tab C. General tab D. Programs tab

Computer Science & Information Technology

Computer security is the use of ____ security techniques to protect data stored on computers.

A. ?physical B. ?port C. ?logical D. ?encrypted

Computer Science & Information Technology