A systems administrator notices that a server on the company network has extremely high CPU utilization. Upon further inspection, the administrator sees that the server Is consistently communicating with an IP address that is traced back to a company that awards digital currency for solving hash algorithms. Which of the following was MOST likely used to compromise the server?
Which of the following best describes when to use the YUM command in Linux?
A large university wants to equip all classrooms with high-definition IP videoconferencing equipment. Which of the following would most likely be impacted in this situation?
A department manager submits a help desk ticket to request the migration of a printer's port utilization from USB to Ethernet so multiple users can access the printer. This will be a new network printer, thus a new IP address allocation is required. Which of the following should happen Immediately before network use is authorized?
A user contacts the help desk to request assistance with a program feature. The user is in a different building but on the same network as the help desk technician. Which of the following should the technician use to assist the user?
A user attempts to install additional software and receives a UAC prompt. Which of the following is the BEST way to resolve this issue?
Which of the following often uses an SMS or third-party application as a secondary method to access a system?
Which of the following would MOST likely be deployed to enhance physical security for a building? (Select TWO).