What features should you configure if you want to limit access to resources by users in a trusted forest, regardless of permission settings on these resources?

A. Fine-grained password policies
B. Selective authentication
C. Trust transitivity
D. SID filtering


Answer: B

Computer Science & Information Technology

You might also like to view...

To alter the default justification for a stream of data, you use the ____________________ manipulator.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If a sound is added to a page with the embed element, which of the following attributes will make the sound start automatically when the page is loaded?

A) loop="false" B) loop="true" C) autostart="false" D) autostart="true"

Computer Science & Information Technology

In addition to the single quotation mark (‘), a comment line in VBA code may begin with ____.

A. Rem B. Comment C. slash (/) D. semi-colon (;)

Computer Science & Information Technology

How does position-based operations allow the programmer to navigate through a list?

A. by incrementing the head pointer B. by decrementing the tail pointer C. by moving the cursor D. by changing the backing store

Computer Science & Information Technology