All GPOs are identified by their __________________
a. Names
b. Globally Unique Identifier (GUID)
c. Fully Qualified Domain Names
d. Policy IDs
B. A GUID is a unique 128-bit number assigned when the GPO is first created. This number is stored as an attribute of the object and is used to identify it within the AD DS.
You might also like to view...
The system recovery drive provides an option for ____ a system image previously created.
A. scanning B. booting C. backing up D. restoring
An exit effect can be used for text on the screen, but cannot be used for an object
Indicate whether the statement is true or false
Once you discover a threat at the recovery site which of the following is important to analyze?
A) Users/Systems Affected B) Discoverable C) Exploitable D) Reproducible
Answer the following statements true (T) or false (F)
1) Autohide enables the tool box to shrink down to the edge of the screen. 2) The Solution Explorer window provides access only to certain files in the solution. 3) The toolbox contains icons representing controls used to customize forms. 4) Commands for managing the IDE and for developing, maintaining and executing programs are contained in the menus, which are located on the menu bar. 5) The programmer can also access all the commands in the menus from the toolbar.