The newly hired security administrator for a company suspects that the previous security administrator has
maliciously left code to corrupt the logging systems in 30 days. Which of the following is suspected to be in the
system?
Which of the following would allow an administrator to perform internal research on security threats and
common viruses on multiple operating systems without risking contamination of the production environment?
Which of the following is the BEST solution for an administrator to implement in order to learn more about the
zeroday exploit attacks on the internal network?
A user reports that their system is slow and reboots on its own. The technician is unable to remotely control the
computer and realizes that they no longer have administrative rights to that workstation. Which of the following
is MOST likely the cause?