Which of the following installation methods is the least suitable method for a large volume of computers?

A. distribution share
B. image-based
C. local share
D. DVD boot

Answer: D

Computer Science & Information Technology

You might also like to view...

All writing styles share similarities. How would you determine which writing style to follow when writing a research paper?

What will be an ideal response?

Computer Science & Information Technology

The firewall administrator is adding a new certificate for the company's remote access solution. The solution requires that the uploaded file contain the entire certificate chain for the certificate to load properly. The administrator loads the company certificate and the root CA certificate into the file. The file upload is rejected.Which of the following is required to complete the certificate chain?

A. Certificate revocation list B. Intermediate authority C. Recovery agent D. Root of trust

Computer Science & Information Technology