<< Prev Question Next Question >>

Question 15/40

A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (40q)
Question 1: A user is buying a laptop. The user will have a lot of perso...
Question 2: A systems administrator uses a program that interacts direct...
Question 3: Which of the following are the basic computing operations?...
Question 4: An end user's computer has been failing to open its word pro...
Question 5: A technician is called to replace a display for a workstatio...
Question 6: A technician needs to install a wireless router for a client...
Question 7: Which of the following would MOST likely prevent malware sen...
Question 8: Which of the following BEST describes a kilobyte?...
Question 9: Which of the following statements BEST describes binary?...
Question 10: For a disaster recovery exercise, a company wants to ensure ...
Question 11: Which of the following operating systems do not require exte...
Question 12: A developer is creating specific step-by-step instructions/p...
Question 13: Which of the following network protocols will MOST likely be...
Question 14: A small company wants to set up a server that is accessible ...
Question 15: A startup company has created a logo. The company wants to e...
Question 16: Joe, a developer, is writing a program in which he needs to ...
Question 17: A systems administrator wants to return results for a time r...
Question 18: Which of the following software license models allows a deve...
Question 19: Joe, a user, finds out his password for a social media site ...
Question 20: Ann, the president of a company, has requested assistance wi...
Question 21: A regulation requires new applicants to provide a scan of th...
Question 22: A technician is troubleshooting a problem. The technician te...
Question 23: A technician is installing a new wireless network and wants ...
Question 24: Which of the following would be BEST to keep the data on a l...
Question 25: Which of the following security concerns is a threat to conf...
Question 26: A company executive wants to view company training videos fr...
Question 27: Which of the following is an example of multifactor authenti...
Question 28: The IT department has established a new password policy for ...
Question 29: Which of the following actions is the FINAL step in the stan...
Question 30: A UPS provides protection against:...
Question 31: Which of the following language types would a web developer ...
Question 32: A user wants to use a laptop outside the house and still rem...
Question 33: A database administrator finds that a table is not needed in...
Question 34: Which of the following is a compiled language?...
Question 35: Which of the following is MOST likely used to represent inte...
Question 36: A program needs to choose apples, oranges, or bananas based ...
Question 37: Which of the following is a value that uniquely identifies a...
Question 38: Given the following pseudocode: (Exhibit) If the Breakfast p...
Question 39: Which of the following relational database constructs is use...
Question 40: Which of the following is an advantage of installing an appl...