.Your company has four regional offices. You are the overall administrator for the entire organization. Each regional office has its own network administrator. You allow yourself and each regional administrator to use the Admin user object to manage the eDirectory tree. You have configured each user object to require unique passwords and to limit grace logins to 3. All user objects for temporary employees have an expiration date assigned to them. Do these policies conform to Novell's security recommendations.?
.
User NWadsworth has the ability to change passwords for users in the CORP.SLC.DA container in the DA-
TREE. What should you check to identify where these rights are coming from? (Choose 3.)