A group whose membership is controlled dynamically by Windows and doesn't appear as an object in Active Directory Users and Computers or ADAC; can be assigned permissions by adding it to resources' DACLs

What will be an ideal response?


special identity group

Computer Science & Information Technology

You might also like to view...

What is database security?

A) A specialty within computer security that protects a database application from unintended use B) Protecting assets you can touch, such as computers, storage devices, backup tapes, and office safe C) Protecting the information that resides on the physical devices, including databases and other computer software D) A tabbed menu system that ties the objects in the database together

Computer Science & Information Technology

You can use the ________ to locate duplicate records in a table

Fill in the blank(s) with correct word

Computer Science & Information Technology

To locate the Slide Master button, click the:

A) INSERT tab on the Ribbon. B) Slide Master ScreenTip. C) Template button. D) VIEW tab on the Ribbon.

Computer Science & Information Technology

_____ provides vital protection and maintenance services for system hardware and software, including enterprise computing systems, networks, transaction processing systems, and corporate IT infrastructure.?

A. ?User support B. ?Database administration C. ?Systems support and security D. ?Network administration

Computer Science & Information Technology