When an RODC's replication partner sends AD DS database information to the RODC, user account information is replicated without any password information. Why would you configure which user account passwords are replicated to the RODC?

a. To reduce replication traffic
b. To conserve storage on the RODC
c. To reduce the number of passwords that could potentially be compromised should the RODC be breached
d. None of the above.


C. Each RODC is partnered with a writable domain controller for password replication purposes. When you deploy an RODC, you must configure the password replication policy on its replication partner. When an RODC's replication partner sends AD DS database information to the RODC, user account information is replicated without any password information

Computer Science & Information Technology

You might also like to view...

An element in a List can be accessed by using the element’s ________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When creating a new PowerPoint presentation, the first slide PowerPoint displays is called the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following kinds of questions gives an applicant for a help desk position a specific problem to solve that is representative of situations that help desk agents actually encounter?

A. directed question B. behavioral question C. non-directed question D. scenario question

Computer Science & Information Technology

Java’s ____ reclaims objects that are no longer referenced by a handle.

A. compiler B. interpreter C. garbage collector D. Virtual Machine

Computer Science & Information Technology