Which of the following is a valid group scope? (Choose all that apply.)
a: Global
b: Domain local
c: Forest
d: Domain global
a: Global
b: Domain local
Computer Science & Information Technology
You might also like to view...
When you import Access data into Excel, you are not linking the two files
Indicate whether the statement is true or false
Computer Science & Information Technology
Which threat analysis involves the use of backdoors?
A) Discoverable B) Exploitable C) Reproducible D) Users/Systems Affected
Computer Science & Information Technology