You work as a Network Administrator for TechMart Inc. The company has a Windows-based network.
After completing a security audit of the company’s Microsoft Windows Server 2008 R2 file servers, you
have determined that folder and share security requires a revision on the basis of corporate reorganization.
You have noticed that some shares on the file system are not secured. Which of the following will you use to
prevent unauthorized changes to computers on the domain?
A.
TCP/IP protocol
B.
Kerberos
C.
User Account Control (UAC)
D.
Lightweight Directory Access Protocol