answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAVERICK [17]
1 year ago
10

You'd like to change the minimum password length policy in the Default Domain Policy group policy preference (GPO). What's the b

est way to go about doing this?
A) Open ADAC and edit policy settings there

B) Manually edit config files in SYSVOL

C) Open the Group Policy Management Console by running gpmc.msc from the CLI

D) Edit the Windows Registry to change group policy settings
Computers and Technology
1 answer:
aleksklad [387]1 year ago
7 0

Answer:

C) Open ----CLI

Explanation:

If the group policy management tools are active, and which you can check in windows features, then you can open the GPMC by running the gpmc,msc, and then they can do the above mentioned changes, and change the minimum password length policy in the default domain policy group policy preference.

Open the GPMC. Now expand the domain, and now your domain, and then th group policy object. Now you are required to rightclick on default domain policy and click on edit. Now move to password policy, which is under Computer configuration\Policies\Windows Settings\Security Settings\Account Policies\Password Policy. Now double click on minimum password length, and change to your desired value. And you are done.

You might be interested in
Sara is using her personal laptop (which is password protected) at a "hotspot" at a local cafe with wifi access. She is in the m
Ymorist [56]

Answer:

C) Exit all programs and shut down the compute

Explanation:

4 0
1 year ago
What elements of SANS 20 you could leverage to reduce the TCP/IP vulnerabilities of your workstation
Vlada [557]

Answer:

- limitation and control of network ports, protocols and services.

- Continuous vulnerability assessment and remediation.

Explanation:

The TCP or transmission control protocol is a layer 4 protocol (transport), that reliably transports packets in sequential segments to an application in the destination computer, using the ip address and the port number of the application.

The ICMP sent during the TCP/ip activities, can render the network vulnerable to attacks. limitation and control of the network ports, protocols and services and continuous assessment would mitigate the vulnerability of the TCP/ip model.

5 0
1 year ago
Menus are attached to windows by calling the _____ method.
Kruka [31]

Answer: setJMenubar

Explanation:Menus that are component of the Menu bar that display the options and tools for any function that can be performed in the system have the connection with the window in the field of java through the command of the setJMenubar. It is the command which is given to execute to bring the menu to the particular frame and get it attached according to the JFrame. Therefore, the correct option is setJMenubar.

6 0
2 years ago
Rene has secured her wireless network. However, she is worried about securing her router against newfound vulnerabilities. Which
Fynjy0 [20]
It is C I have a lot of experience with computers and technology
4 0
1 year ago
Windows is displaying an error about incompatible hardware. You enter BIOS/UEFI setup to change the boot priority order so that
Irina18 [472]

Answer:

A

Explanation:

The most likely cause of the problem is that You signed in to BIOS/UEFI with the user power-on password rather than the supervisor power-on password. The User password only enables the machine to boot while the supervisor password allows entering the BIOS settings.

4 0
2 years ago
Other questions:
  • On the Picture Tools Layout tab, you can preview results of the numerous styles, borders, effects, and layouts by _______ comman
    7·2 answers
  • You just got a shipment of 10 network-attached laser printers. You want these printers to always have the same address but you w
    12·1 answer
  • Describe the basic features of the relational data model and discuss their importance to the end user and the designer. Describe
    9·1 answer
  • Which of the following can you NOT apply for at any FLHSMV office? A. Certificate of title B. License plates C. Vehicle registra
    15·2 answers
  • Create an abstract Division class with fields for a company's division name and account number, and an abstract display() method
    14·1 answer
  • We have an internal webserver, used only for testing purposes, at IP address 5.6.7.8 on our internal corporate network. The pack
    15·1 answer
  • 7.8.1: Function pass by reference: Transforming coordinates. Define a function CoordTransform() that transforms the function's f
    6·1 answer
  • A 1.17 g sample of an alkane hydrocarbon gas occupies a volume of 674 mL at 28°C and 741 mmHg. Alkanes are known to have the gen
    14·1 answer
  • Complete this truth Table. Write a program that you can enter from the keyboard, a 1 or 0 into three Boolean variables, A,B,C. W
    14·1 answer
  • In order to avoid slipping in the shop, your footwear should ___________.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!