MMC is designed to be used in a domain environment; however, in a workgroup environment with different security boundaries, you might be required to use the Run As function for a custom MMC console

Indicate whether the statement is true or false


True —You might also need to adjust Windows Firewall settings, ensure that the Secondary Logon services are started, and ensure that an account with the appropriate permissions is available on the workgroup computers.

Computer Science & Information Technology

You might also like to view...

Hotspots are defined through the use of ____ maps.

A. target B. image C. practice D. link

Computer Science & Information Technology

____ networks have computers that are servers and computers that act as clients to those servers.

A. EMI B. Peer-to-peer C. Peer-to-node D. Client/server

Computer Science & Information Technology

When working with contacts in any view, you can ____________________ the contacts to display them in a different order.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Given the following array, what would be the array order after two passes of the selection sort?{22 38 57 26 91 10 63}

A. {10 22 57 26 91 38 63} B. {10 22 26 38 57 63 91} C. {22 38 57 26 91 10 63} D. {10 22 26 38 57 63 91} E. {22 63 38 57 26 91 10}

Computer Science & Information Technology