If one domain controller goes down, and another one is available to authenticate logon requests and locate resources through the directory, this is an example of _________

a. Fault tolerance
b. Load balancing
c. RAID
d. Flexible single master operations


A.

Computer Science & Information Technology

You might also like to view...

A(n) ________ can be thought of as an address that is used to direct a browser to a resource on the Web.

a) middle tier b) ASPX page c) URL d) query string

Computer Science & Information Technology

The ________ paste option removes all formatting from the selection

Fill in the blank(s) with correct word

Computer Science & Information Technology

What are two probability distributions used in business and what is one practical application for each?

What will be an ideal response?

Computer Science & Information Technology

What is the purpose of the policy exceptions section?

A. To define sanctions for violations B. To convey intent C. To define exclusions D. To specify mandatory directives

Computer Science & Information Technology