You want a Windows Server 2012 computer to handle network logons and enforce network access and security policies. How should you configure this computer?

A. with IIS
B. as a DNS server
C. as a domain controller
D. with NIS


Answer: C

Computer Science & Information Technology

You might also like to view...

Why does CSMA/CD use a random delay? (Hint: think of many identical computers on a network.)

What will be an ideal response?

Computer Science & Information Technology

PSP scripting components include _______, _______ and ________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Many online forms require a visitor to fill out certain controls to ensure that the form collects the basic information needed for follow up.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When moving through an area, several Base Transceiver Stations might handle your call—a hand-off would occur from one BTS to another. In a ________ hand-off, the communication is handled by one Base Transceiver Station at a time with no simultaneous communication

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology