subject

Set computer security policies that affect all computers as follows: Deny guests the ability to log on to computers from the network. Do not display the last username that logged on to a computer. Do not allow a system to be shut down unless somebody is logged on. When logon hours expire, users should be logged off the system. Set the following additional policies that affect all computer accounts: Change the default group policy refresh interval to 45 minutes for computers, with the random time interval set to 15 minutes. Configure user profiles to be deleted after 90 consecutive days of nonuse. Configure Windows Update so that updates are downloaded and installed automatically every day at 3:00 a. m.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 21:30
Asuccessful format string attack attempted to steal user account information by reading from unauthorized memory. answer the followings with proper explanation a)this attack will lead to violation of which security policies?
Answers: 2
question
Computers and Technology, 23.06.2019 06:00
Respond to the following in three to five sentences. select the workplace skill, habit, or attitude described in this chapter that you believe is most important for being a successful employee.
Answers: 1
question
Computers and Technology, 23.06.2019 09:50
Allison and her group have completed the data entry for their spreadsheet project. they are in the process of formatting the data to make it easier to read and understand. the title is located in cell a5. the group has decided to merge cells a3: a7 to attempt to center the title over the data. after the merge, allison points out that it is not centered and looks bad. where would the title appear if allison unmerged the cells in an attempt to fix the title problem?
Answers: 2
question
Computers and Technology, 23.06.2019 15:20
An ou structure in your domain has one ou per department, and all the computer and user accounts are in their respective ous. you have configured several gpos defining computer and user policies and linked the gpos to the domain. a group of managers in the marketing department need different policies that differ from those of the rest of the marketing department users and computers, but you don't want to change the top-level ou structure. which of the following gpo processing features are you most likely to use? a, block inheritance b, gpo enforcement c, wmi filtering d, loopback processing
Answers: 3
You know the right answer?
Set computer security policies that affect all computers as follows: Deny guests the ability to log...
Questions
question
Mathematics, 22.10.2020 04:01
question
Social Studies, 22.10.2020 04:01
question
English, 22.10.2020 04:01
question
Engineering, 22.10.2020 04:01
question
Mathematics, 22.10.2020 04:01
Questions on the website: 13722363