When a user from a trusted domain attempts to authenticate to a trusting domain, ________________ validates the SIDs within the user's authentication ticket
a. Site filtering
b. SID filtering
c. Trust filtering
d. None of the above.
B. SID filtering verifies that the incoming authentication request contains SIDs of security principals in only the trusted domain. If SIDs from domains other than the trusted domain are present, they are filtered out, thereby denying the authentication request.
Computer Science & Information Technology
You might also like to view...
Power View uses ________ in the data model to understand the relationships between the different tables and fields used in the report
A) sparklines B) reports C) metadata D) full-screen mode
Computer Science & Information Technology
Which of the following statements about recursion are true?
a. Recursion can occur infinitely. b. Recursion uses a termination test. c. Both a and b. d. Neither a nor b.
Computer Science & Information Technology