Which of the following principles has the user violated?
A technician needs to troubleshoot a user’s computer. The user leaves personal credentials
written on a piece of paper for the technician. Which of the following principles has the user
violated?
Which of the following should he consider?
Joe, a user, has many applications on his computer and is trying to use software
management best practices. Which of the following should he consider?
which of the following?
A user’s government identification number, birth date, and current address are considered
which of the following?
Which of the following options is a BEST next choice?
A user, Ann, calls the manufacturer of a software product she purchased, but is denied
assistance because the product is no longer supported. Which of the following options is a
BEST next choice?
Which of the following software types BEST facilitates collaboration?
Which of the following software types BEST facilitates collaboration?
which of the following is the BEST feature to disable on a mobile device when not in use?
To increase security, which of the following is the BEST feature to disable on a mobile
device when not in use?
Which of the following data connectivity options is the BEST to use when both high availability and reliabilit
Which of the following data connectivity options is the BEST to use when both high
availability and reliability are required?
Which of the following is the FIRST thing the technician should check?
A technician has added an external hard drive to a personal computer. The hard drive is
powered on, but the computer does not see the new hard disk. Which of the following is the
FIRST thing the technician should check?
Which of the following is the MOST secure password?
Which of the following is the MOST secure password?
Which of the following protocols will provide the MOST security when uploading the files?
A user is updating a website. Which of the following protocols will provide the MOST
security when uploading the files?