After a template account has been created, what can be done to ensure that the template account does not pose a security risk?
A. The account should be placed in an isolated OU
B. A specialized GPO should be applied to the OU the template account is located in, to limit risk
C. The account should be disabled
D. The account should be removed from the "Domain Users" group
Answer: C
You might also like to view...
Which file open mode would be used to write data only to the end of an existing file?
a. ios::app b. ios::in c. ios::out d. ios::trunc
The data stored in an object are commonly called fields, or ____________.
a. attributes b. characteristics c. properties d. values
The clone method has ________ parameters.
(a) zero (b) one (c) two (d) three
(Sieve of Eratosthenes) Modify Fig. 22.40, the Sieve of Eratosthenes, so that, if the number the user inputs into the program is not prime, the program displays the prime factors of the number. Remember that a prime number’s factors are only 1 and the prime number itself. Every nonprime number has a unique prime factorization. For example, the factors of 54 are 2, 3, 3 and 3. When these values
are multiplied together, the result is 54. For the number 54, the prime factors output should be 2 and 3. What will be an ideal response?