A user receives an email with an attached data file containing an exploit. What is it's likely effect? (Choose two.)
Which two statements about troubleshooting installation and upgrade problems are true? (Choose two.)
How does an administrator make a Tech Support File?
Which statement about Malware verdicts is true?
What are two ways to prevent exploits? (Choose two.)