Which of the following will you use to prevent unauthorized changes to computers on the domain?

You work as a Network Administrator for TechMart Inc. The company has a Windows-based
network. After completing a security audit of the company’s Microsoft Windows Server 2008 R2 file
servers, you have determined that folder and share security requires a revision on the basis of
corporate reorganization. You have noticed that some shares on the file system are not secured.
Which of the following will you use to prevent unauthorized changes to computers on the domain?

You work as a Network Administrator for TechMart Inc. The company has a Windows-based
network. After completing a security audit of the company’s Microsoft Windows Server 2008 R2 file
servers, you have determined that folder and share security requires a revision on the basis of
corporate reorganization. You have noticed that some shares on the file system are not secured.
Which of the following will you use to prevent unauthorized changes to computers on the domain?

A.
TCP/IP protocol

B.
Kerberos

C.
User Account Control (UAC)

D.
Lightweight Directory Access Protocol

Explanation:
User Account Control (UAC) is used to prevent unauthorized changes to computers on the domain
a service in a computer network.
service protocol that is used to provide a mechanism used to connect to, search, and modify Internet
directories.
for communicating with each other over the internet.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


sully

sully

correct answer is C