Windows Server Backup can perform a restore operation in which restored objects will be propagated to other domain controllers and not overwritten at AD DS replication time. This is called a(n) __________________

a. Nonauthoritative restore
b. Authoritative restore
c. Full server recovery
d. None of the above.


B. Restored objects are marked as authoritative.

Computer Science & Information Technology

You might also like to view...

Three primary activities of a typical program are

A) creating variables, operators, and keywords. B) executing lines, statements, and keywords. C) reading, writing, and arithmetic. D) input, processing, and output. E) compiling, linking, and debugging.

Computer Science & Information Technology

What is the last legal subscript that can be used with the following array?

int values[5]; a. 0 b. 5 c. 6 d. 4 e. 1

Computer Science & Information Technology

__________ is the elapsed time between job submission and job completion.

a. Throughput b. Turnaround c. Response time d. none of the above

Computer Science & Information Technology

____ shows a correct array initialization statement.

A. char codes[4] = {'s', 'a', 'm', 'p', 'l', 'e'}; B. char codes[] = {'s', 'a', 'm', 'p', 'l', 'e'}; C. char codes = {'s', 'a', 'm', 'p', 'l', 'e'}; D. char codes[*] = {'s', 'a', 'm', 'p', 'l', 'e'};

Computer Science & Information Technology