Jim wants to allow a partner organization's Active Directory forest (B) to access his domain forest's (A)'s resources but doesn't want to allow users in his domain to access B's resources. He also does not want the trust to flow upward through the domain tree as it is formed. What should he do?

A. Set up a two-way transitive trust.
B. Set up a one-way transitive trust.
C. Set up a one-way nontransitive trust.
D. Set up a two-way nontransitive trust.


Answer: C. Set up a one-way nontransitive trust.

Computer Science & Information Technology

You might also like to view...

Most Web browsers use a fill-in _____ for unordered lists.

A. square B. rectangle C. circle D. bullet

Computer Science & Information Technology

Why is an evaluation that uses only synthetic programs inadequate for predicting performance?

a) In general, it is a good idea to use more than one evaluation technique to confirm the results obtained from each type of evaluation. b) Synthetic programs are not real programs and typically target only a specific subsystem so they do not evaluate how the overall system will perform while executing real programs. c) Synthetic programs provide valuable insight into which components are creating bottlenecks, but they do not always indicate the precise cause of a component’s inefficiency. d) all of the above

Computer Science & Information Technology

What formatted unit of data has an error-checking code called the frame check sequence and is ready to be transferred to the network medium?

A. Frame B. Packet C. Segment D. Data Unit

Computer Science & Information Technology

All system attacks need a user to open an e-mail or Web page.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology