If one domain controller goes down, and another one is available to authenticate logon requests and locate resources through the directory, this is an example of _________
a. Fault tolerance
b. Load balancing
c. RAID
d. Flexible single master operations
A.
Computer Science & Information Technology
You might also like to view...
A(n) ________ can be thought of as an address that is used to direct a browser to a resource on the Web.
a) middle tier b) ASPX page c) URL d) query string
Computer Science & Information Technology
The ________ paste option removes all formatting from the selection
Fill in the blank(s) with correct word
Computer Science & Information Technology
What are two probability distributions used in business and what is one practical application for each?
What will be an ideal response?
Computer Science & Information Technology
What is the purpose of the policy exceptions section?
A. To define sanctions for violations B. To convey intent C. To define exclusions D. To specify mandatory directives
Computer Science & Information Technology