All GPOs are identified by their ________

a. Names
b. Globally Unique Identifier (GUID)
c. Fully Qualified Domain Names
d. PolicyIDs


B. A GUID is a unique 128-bit number assigned when the GPO is first created. This number is stored as an attribute of the object and is used to identify it within the AD DS.

Computer Science & Information Technology

You might also like to view...

Iterators are similar to pointers because of the:

a. * and ++ operators. b. -> operator. c. begin and end functions. d. & operator.

Computer Science & Information Technology

A _____ must be achieved to fulfill a company's mission.

A. ?key performance factor B. ?core competency C. ?critical success factor D. ?vision competency

Computer Science & Information Technology

The ______ code for a task that needs to be performed often can be stored in a code library

A. object B. processing C. container D. assembly

Computer Science & Information Technology

A ____ is a program that hides in a computer and allows someone from a remote location to take full control of the computer.

A. virus B. Trojan horse C. worm D. rootkit

Computer Science & Information Technology