Accidental corruption or deletion of database components or the ________ folder by an inexperienced individual in a branch office does not have any impact on network operations
a. Sysvol
b. System
c. Application
d. None of the above.
D. The RODC provides enhanced security, in that even if an unauthorized user were somehow able to make changes to the RODC, these changes would not be replicated to other domain controllers. Consequently, a compromised RODC has no effect on other domain controllers.
Computer Science & Information Technology
You might also like to view...
A ________ indent is where the first line of the paragraph extends to the left of the rest of the paragraph
Fill in the blank(s) with correct word
Computer Science & Information Technology
____ of memory is performed by the operating system to reclaim fragmented sections of the memory space.
A. Deallocation B. Redirection C. Compaction D. Reallocation
Computer Science & Information Technology