What specific type of Windows Servers are used to authenticate user accounts and contain most of the information that attackers want to access?

A. SMB controllers
B. domain controllers
C. CIFS servers
D. file servers


Answer: B

Computer Science & Information Technology

You might also like to view...

Whenever you want to modify Hue/Saturation in non-specific areas of an image, think of using the ____ feature.

A. Modify Color B. Choose Color C. Replace Color D. Change Color Area

Computer Science & Information Technology

Which of the following is NOT true when changing the data type in an existing field?

A) You can change the size of a field in Datasheet view and Design view. B) If you decide that a field length needs to be longer, you can change the field without concern. C) If you make a field length shorter and there were data that needed the longer length, you may truncate those values. D) Access will always warn you that data may be lost if you change the length to a smaller size.

Computer Science & Information Technology

The design and implementation of a collection class consists of two steps. What is the first step?

A. document the class using docstrings B. choose an appropriate data structure C. write the code for the defined methods D. test the method using sample data

Computer Science & Information Technology

Systems that interact with a DBMS are relatively independent of how the physical data is maintained. 

Answer the following statement true (T) or false (F)

Computer Science & Information Technology