Which of the following utilities can an administrator use to manage hardware, software, and network components?
Which of the following type of malware tries to strong arm customers into purchasing unwanted, fake security software in order to solve non-existent problems on their machines?
Which of the following should be used to restore a Windows 7 System Image to a new replacement hard drive?