Which of the following is a valid group scope? (Choose all that apply.)

a: Global

b: Domain local

c: Forest

d: Domain global

a: Global

b: Domain local

Computer Science & Information Technology

You might also like to view...

When you import Access data into Excel, you are not linking the two files

Indicate whether the statement is true or false

Computer Science & Information Technology

Which threat analysis involves the use of backdoors?

A) Discoverable B) Exploitable C) Reproducible D) Users/Systems Affected

Computer Science & Information Technology