On an RODC, you can use _____________ to encrypt all the data on the server's hard disk
a. Cipher
b. BitLocker
c. Certificates
d. Adhide
B. By using BitLocker, a thief who manages to steal the RODC will be unable to recover information such as the Active Directory database, group policy information, file shares, and other data on local volumes.
You might also like to view...
Which of the following is not a correct statement for configuring a route to run over OSPF? Assume that OSPF has been enabled.
a. network 10.10.20.0 0.0.0.127 area 0 b. network 10.10.20.1 0.0.0.255 area 0 c. network 10.0.0.0 0.0.255.255 d. network 10.10.100.1 0.0.0.0 area 0
Photoshop has 10 sets or ______ of additional gradients to create a wide variety of special fill effects.
Fill in the blank(s) with the appropriate word(s).
One of the two locking options, Contents cannot be edited, enables you to delete, but NOT edit the content in the control
Indicate whether the statement is true or false
A computer forensics examiner should always photograph and document everything found at the crime scene. Particularly important at this point is the need to photograph the ________ between devices. These can be quite complex, and photographs help the examiner back at the lab see how devices were configured and connected
Fill in the blank(s) with the appropriate word(s).