Which of the following commands lists running processes in Linux?
A company was recently attacked by ransomware. The IT department has remediated the threat and determined that the attack method used was email. Which of the following is the most effective way to prevent this issue from reoccurring?
An employee has been using the same password for multiple applications and websites for the past several years. Which of the following would be best to prevent security issues?
A company using Active Directory wants to change the location of all users' "Documents" to a file server on the network. Which of the following should the company set up to accomplish this task?