A computer technician is investigating a computer that is not booting. The user reports that the computer was working prior to shutting it down last night. The technician notices a removable USB device is inserted, and the user explains the device is a prize the user received in the mail yesterday. Which of the following types of attacks does this describe?
A technician is familiar with most personnel at a customer's location and has clearance to work unsupervised. Which of the following describes how the technician should handle personal communication while on site?
An engineer is configuring a new server that requires a bare-metal installation. Which of the following installation methods should the engineer use if installation media is not available on site?
Which of the following is the most likely to use NTFS as the native filesystem?
Which of the following operating systems is most commonly used in embedded systems?
An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?
Which of the following should be documented to ensure that the change management plan is followed?