Which of the following should an administrator use to transfer log files from a Linux server to a Windows workstation?
Which of the following can be used to map a network drive to a user profile?
A company stores extremely sensitive data on an alt-gapped system. Which of the following can Be Implemented to increase security against a potential insider threat?
A server administrator wants to run a performance monitor for optimal system utilization. Which of the following metrics can the administrator use for monitoring? (Choose two.)