A user is attempting to access a shared drive from a company-issued laptop while working from home. The user is unable to access any files and notices a red X next to each shared drive. Which of the following needs to be configured in order to restore the user's access to the shared drives?
Which of the following attacks can a hacker use to execute code on a user's computer when the user visits a specially prepared, malicious website?
Which of the following macOS file types requires mounting before installation?
Users report that a network printer intermittently goes offline during the day. Which of the following commands should the technician use to confirm whether the printer has connectivity issues?