Which three actions should you perform in sequence?
Which command segments should you use to complete the command?
You need to assign security groups to local security policies to meet the requirements
Which commands should you run?