单项选择题
A. Change the permissions on the file.
B. End the running process.
C. Run the antivirus scan again.
D. Use the command line to delete the file.
单项选择题 Which of the following tools can be used to securely connect to a remote system?()
单项选择题 During system startup, many applications are starting that are not needed. Which of the following can be used to evaluate all startup applications?()
单项选择题 When attempting to boot a PC, the POST process completes without error. The PC then displays,‘non system disk or disk error’. Which of the following would MOST likely cause the issue?()