On an RODC, you can use _____________ to encrypt all the data on the server's hard disk

a. Cipher
b. BitLocker
c. Certificates
d. Adhide


B. By using BitLocker, a thief who manages to steal the RODC will be unable to recover information such as the Active Directory database, group policy information, file shares, and other data on local volumes.

Computer Science & Information Technology

You might also like to view...

Which of the following is not a correct statement for configuring a route to run over OSPF? Assume that OSPF has been enabled.

a. network 10.10.20.0 0.0.0.127 area 0 b. network 10.10.20.1 0.0.0.255 area 0 c. network 10.0.0.0 0.0.255.255 d. network 10.10.100.1 0.0.0.0 area 0

Computer Science & Information Technology

Photoshop has 10 sets or ______ of additional gradients to create a wide variety of special fill effects.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

One of the two locking options, Contents cannot be edited, enables you to delete, but NOT edit the content in the control

Indicate whether the statement is true or false

Computer Science & Information Technology

A computer forensics examiner should always photograph and document everything found at the crime scene. Particularly important at this point is the need to photograph the ________ between devices. These can be quite complex, and photographs help the examiner back at the lab see how devices were configured and connected

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology