When using the protected users global group, what is not a valid security restriction imposed on the group?

A. Group members cannot use weaker forms of authentication, such as NTLM, CredSSP, or digest authentication.
B. Connections to systems that do not utilize this global group may not succeed.
C. Only higher-level encryption methods compatible with Kerberos security, such as Advanced Encryption Standard (AES) can be used.
D. Only computers running Windows 7 or higher can be made member computers.


Answer: D

Computer Science & Information Technology

You might also like to view...

The ____ keyword indicates that the procedure can be used only within the current Code Editor window.

A. Public B. Private C. Friend D. Hidden

Computer Science & Information Technology

Convert decimal 299 to binary, to octal, and to hexadecimal.

What will be an ideal response?

Computer Science & Information Technology

If you worked on the document recently, you can click the File tab, on the navigation bar,click Recent, and then in the middle pane, click the name of the document in the listof recently opened and saved documents.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What are the four phases of compilation?

What will be an ideal response?

Computer Science & Information Technology