All GPOs are identified by their ________
a. Names
b. Globally Unique Identifier (GUID)
c. Fully Qualified Domain Names
d. PolicyIDs
B. A GUID is a unique 128-bit number assigned when the GPO is first created. This number is stored as an attribute of the object and is used to identify it within the AD DS.
You might also like to view...
Iterators are similar to pointers because of the:
a. * and ++ operators. b. -> operator. c. begin and end functions. d. & operator.
A _____ must be achieved to fulfill a company's mission.
A. ?key performance factor B. ?core competency C. ?critical success factor D. ?vision competency
The ______ code for a task that needs to be performed often can be stored in a code library
A. object B. processing C. container D. assembly
A ____ is a program that hides in a computer and allows someone from a remote location to take full control of the computer.
A. virus B. Trojan horse C. worm D. rootkit