Which of the following switches of the XCOPY command copies file ownerships and NTFS permissions on files while copying the files?
Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee’s computer?