What flag used in conjunction with cipher will invoke the recovery agent key so that a server administrator can set up a recovery policy?

A. cipher /e
B. cipher /r
C. cipher /n
D. cipher /u


Answer: B

Computer Science & Information Technology

You might also like to view...

To step through a one-dimensional array, accessing the elements one by one, it would be most appropriate to use ________ loop.

A) an infinite B) a sentinel controlled loop C) a for loop D) a nested loop E) no

Computer Science & Information Technology

Write code that sets each element of a boolean array called flags to alternating values (true at index 0, false at index 1, etc.).

What will be an ideal response?

Computer Science & Information Technology

How is a form used?

What will be an ideal response?

Computer Science & Information Technology

You must include page numbers when creating cross-reference listings

Indicate whether the statement is true or false

Computer Science & Information Technology