A user reports that double-clicking an application ' s shortcut fails to launch the program. A technician believes the application process is running in the background in an unresponsive state. Which of the following tools should the technician use to resolve the issue?
A technician needs to provide remote support for a legacy Linux-based operating system from their Windows laptop. The solution needs to allow the technician to see what the user is doing and provide the ability to interact with the user ' s session. Which of the following remote access technologies would support the use case?
A technician thinks that an application a user downloaded from the internet may not be the legitimate one, even though the name is the same. The technician needs to confirm whether the application is legitimate. Which of the following should the technician do?
A technician is securing a newly deployed workstation. Only authorized users should access it. Which actions should the technician take? (Select two)