When running ADMT, if the source and target domains are in different forests, you must configure _______________ between the domains in use to ensure data security during the migration process

a. Trust relationships
b. Global catalogs
c. Email accounts
d. New users

A.

Computer Science & Information Technology

You might also like to view...

When the pen, highlighter or laser pointer is being used, which keyboard key can NOT be used to advance though the slide show?

A) Enter key B) Spacebar C) Arrow key D) Tab key

Computer Science & Information Technology

At the lowest level, words are entered into database fields (columns), which hold single pieces of data in the database, such as product names or quantities. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology