<< Prev Question Next Question >>

Question 4/39

A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (39q)
Question 1: A program needs to choose apples, oranges, or bananas based ...
Question 2: Which of the following intellectual property concepts BEST r...
Question 3: Which of the following network protocols will MOST likely be...
Question 4: A startup company has created a logo. The company wants to e...
Question 5: Joe, a user, finds out his password for a social media site ...
Question 6: A systems administrator uses a program that interacts direct...
Question 7: A small company wants to set up a server that is accessible ...
Question 8: Which of the following relational database constructs is use...
Question 9: In which of the following situations should there be come ex...
Question 10: Which of the following would MOST likely prevent malware sen...
Question 11: Which of the following is a compiled language?...
Question 12: The IT department has established a new password policy for ...
Question 13: A systems administrator wants to return results for a time r...
Question 14: A database administrator finds that a table is not needed in...
Question 15: A user is buying a laptop. The user will have a lot of perso...
Question 16: A user wants to use a laptop outside the house and still rem...
Question 17: Which of the following is an example of multifactor authenti...
Question 18: Which of the following is a wireless communication that requ...
Question 19: A user is attempting to print a document to a wireless print...
Question 20: A technician needs to install a wireless router for a client...
Question 21: Which of the following language types would a web developer ...
Question 22: A company executive wants to view company training videos fr...
Question 23: A technician is troubleshooting a problem. The technician te...
Question 24: Which of the following actions is the FINAL step in the stan...
Question 25: Joe, a developer, is writing a program in which he needs to ...
Question 26: An end user's computer has been failing to open its word pro...
Question 27: A regulation requires new applicants to provide a scan of th...
Question 28: Which of the following would be BEST to keep the data on a l...
Question 29: Which of the following is an advantage of installing an appl...
Question 30: A UPS provides protection against:...
Question 31: A technician is called to replace a display for a workstatio...
Question 32: A technician is installing a new wireless network and wants ...
Question 33: Which of the following operating systems do not require exte...
Question 34: Which of the following is a value that uniquely identifies a...
Question 35: Ann, the president of a company, has requested assistance wi...
Question 36: A user is getting an error message when trying to go to a we...
Question 37: Which of the following statements BEST describes binary?...
Question 38: Which of the following is MOST likely used to represent inte...
Question 39: A developer is creating specific step-by-step instructions/p...