Which of the following will you use to prevent unauthorized changes to computers on the domain?

You work as a Network Administrator for TechMart Inc. The company has a Windows-based
network. After completing a security audit of the company’s Microsoft Windows Server 2008 R2 file
servers, you have determined that folder and share security requires a revision on the basis of
corporate reorganization. You have noticed that some shares on the file system are not secured.
Which of the following will you use to prevent unauthorized changes to computers on the domain?

You work as a Network Administrator for TechMart Inc. The company has a Windows-based
network. After completing a security audit of the company’s Microsoft Windows Server 2008 R2 file
servers, you have determined that folder and share security requires a revision on the basis of
corporate reorganization. You have noticed that some shares on the file system are not secured.
Which of the following will you use to prevent unauthorized changes to computers on the domain?

A.
TCP/IP protocol

B.
Kerberos

C.
User Account Control (UAC)

D.
Lightweight Directory Access Protocol

Explanation:
User Account Control (UAC) is used to prevent unauthorized changes to computers on the domain

Answer B is incorrect. Kerberos is defined as a secure method used for authenticating a request for
a service in a computer network.

Answer D is incorrect. The Lightweight Directory Access Protocol (LDAP) is defined as a directory
service protocol that is used to provide a mechanism used to connect to, search, and modify Internet
directories.

Answer A is incorrect. TCP/IP protocol is used to define the rule computers are required to follow
for communicating with each other over the internet.



Leave a Reply 0

Your email address will not be published. Required fields are marked *