Group policies can be set for which of the following?
a. local computer
b. OU
c. site
d. domain
e. all of the above
Ans: e. all of the above
Computer Science & Information Technology
You might also like to view...
A security technician would like to obscure sensitive data within a file so that it can be transferred without causing suspicion.Which of the following technologies would BEST be suited to accomplish this?
A. Transport Encryption B. Stream Encryption C. Digital Signature D. Steganography
Computer Science & Information Technology
Describe what role the reviewer plays in the security review process.
What will be an ideal response?
Computer Science & Information Technology