When you create a new GPO or edit an existing one, and if you have configured new settings in the Computer Configuration node, users affected by the GPO must _________________

a. Log off and log back on again
b. Reboot their computers
c. Do nothing because the settings will automatically apply
d. Refresh the desktop


B. If you have configured new settings in the Computer Configuration node, users must reboot their computers to receive the new settings

Computer Science & Information Technology

You might also like to view...

The color scheme that uses two hues close to one another on the color wheel in which one color is thedominant color and the other is a supporting color used only for highlights and nuance is _____.

A. triad B. tetrad C. analogic D. monochrome

Computer Science & Information Technology

In a transaction processing cycle, capturing data at its source and recording it accurately in a timely fashion with minimal manual effort and in an electronic or digital form so that it canĀ be directly entered into the computerĀ is known as _____.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Opening ____ in your firewall provides all computers access to MySQL through your firewall.

A. databases B. Web pages C. groups D. ports

Computer Science & Information Technology

These firewall technologies block traffic based on the IP address. (Select all that apply.)

A. packet filtering B. MAC filtering C. port filtering D. IP filtering E. both A and C

Computer Science & Information Technology