After a template account has been created, what can be done to ensure that the template account does not pose a security risk?

A. The account should be placed in an isolated OU
B. A specialized GPO should be applied to the OU the template account is located in, to limit risk
C. The account should be disabled
D. The account should be removed from the "Domain Users" group


Answer: C

Computer Science & Information Technology

You might also like to view...

Which file open mode would be used to write data only to the end of an existing file?

a. ios::app b. ios::in c. ios::out d. ios::trunc

Computer Science & Information Technology

The data stored in an object are commonly called fields, or ____________.

a. attributes b. characteristics c. properties d. values

Computer Science & Information Technology

The clone method has ________ parameters.

(a) zero (b) one (c) two (d) three

Computer Science & Information Technology

(Sieve of Eratosthenes) Modify Fig. 22.40, the Sieve of Eratosthenes, so that, if the number the user inputs into the program is not prime, the program displays the prime factors of the number. Remember that a prime number’s factors are only 1 and the prime number itself. Every nonprime number has a unique prime factorization. For example, the factors of 54 are 2, 3, 3 and 3. When these values

are multiplied together, the result is 54. For the number 54, the prime factors output should be 2 and 3. What will be an ideal response?

Computer Science & Information Technology