Server Configure
Server Configure
69. Your IT manager is concerned that someone is trying to gain access to your
company's computers by logging on with valid domain user names and various
password attempts. Which audit policy should you monitor for these activities?
a) IP address c) url
b) MAC address d) none of the mentioned
73. DHCP is used for