A compromised RODC has the greatest effect on which domain controller?
a. PDC emulator
b. Schema master
c. Infrastructure master
d. None of the above.
D. The RODC provides enhanced security, in that even if an unauthorized user were somehow able to make changes to the AD DS database on the RODC, these changes would not be replicated to other domain controllers. Consequently, a compromised RODC has no effect on other domain controllers.
You might also like to view...
The ____ statement directs a program's flow through the statements within it, while counting through a range of numbers.
A. doTogether B. if C. for D. doInOrder
Which of the following are valid declarations for an assignment operator for a class named myClass?
a. void friend operator = (myClass& left, const myClass& source); b. void operator = (myClass& left, const myClass& source); c. void friend operator = (const myClass& source); d. void operator = (const myClass& source);
The ____ instruction can be used to display messages or the value of variables and parameters in a special text zone at the bottom of a running Alice world.
A. print B. more C. show D. say
Keeping all the style sheets in one ____________________ makes them easy to locate.
Fill in the blank(s) with the appropriate word(s).