Which of the following can be pushed down to a computer and can be changed by the user?

A. Group Policy Object
B. Group Policy Preference
C. Group Policy Setting
D. Group Domain object


Answer: B

Computer Science & Information Technology

You might also like to view...

MC When the programmer knows how many times a loop will execute in advance, a______ loop should be used.

a) sentinel. b) infinite. c) counter-controlled. d) None of the above.

Computer Science & Information Technology

A ________ key is required when one field alone can not be used to identify each unique record in a table

A) relationship B) primary C) static D) composite

Computer Science & Information Technology

Consider the following equation: 3 * (6 + 5 ) - 4 / 2. Which operation would be calculated FIRST according the order of operations?

A) 3 * 6 B) 4 / 2 C) 5 - 4 D) 6 + 5

Computer Science & Information Technology

How can VLAN hopping attacks be prevented on a network??

A. ?Install an additional switch to isolate traffic. B. ?Disable auto trunking and move native VLANs to unused VLANs. C. ?Install a router to process the untagged traffic on the VLAN. D. ?Use MAC address filtering.

Computer Science & Information Technology