You can configure a local user with administrative rights to the RODC without designating this user as a member of the Domain Admins group. This user is included in the RODC's ____________ group

a. Enterprise admins
b. Backup operators
c. Local administrators
d. Domain users


C. The local administrators group is stored on the Security Accounts Manager (SAM) on the RODC and has administrative rights to that server only.

Computer Science & Information Technology

You might also like to view...

In the following code block, which of the following represents the line of code that assigns the value of the Name property?

``` Class Student Private m_name As String Public Property Name() As String Get Return m_name End Get Set(Value As String) m_name = Value End Set End Property End Class ``` (A) End Class (B) m_name = Value (C) Return m_name (D) Private m_name As String

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Message authentication is a mechanism or service used to verify the integrity of a message. 2. The order in which the frame check sequence and encryption functions are performed is not critical for authentication. 3. The MAC does not provide a digital signature because both sender and receiver share the same key. 4. A recipient in possession of the secret key cannot generate an authentication code to verify the integrity of the message. 5. One means of forming a MAC is to combine a cryptographic hash function in some fashion with a secret key.

Computer Science & Information Technology

Expression Web includes controls for a Submit button, a Reset button, and a(n) ____.

A. Enter button B. button you can customize C. Send button D. Back button

Computer Science & Information Technology

A(n) ____ is a book of synonyms.

A. dictionary B. glossary C. index D. thesaurus

Computer Science & Information Technology