<< Prev Question Next Question >>

Question 46/112

A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (112q)
Question 1: Which of the following filesystems is compatible with the gr...
Question 2: Which of the following shows how many results are possible w...
Question 3: Which of the following language types would a web developer ...
Question 4: When transferring a file across the network, which of the fo...
Question 5: Which of the following software solutions ensures that progr...
Question 6: Which of the following is an example of information a compan...
Question 7: Which of the following is most appropriate to list on a soci...
Question 8: Which of the following types of encryptions would BEST prote...
Question 9: A user revisits a website and receives a message that the si...
Question 10: Which of the following commands can be used to remove a data...
Question 11: An administrator grants permission for a user to access data...
Question 12: Which of the following programming languages would most like...
Question 13: Given this example: FEB8077911AB12TB Which of the following ...
Question 14: A programmer is generating results by iterating rows that pr...
Question 15: A small company has authorized an allowance for employees to...
Question 16: Which of the following types of memory can retain its conten...
Question 17: A company purchased a software program. The EULA states that...
Question 18: A function is BEST used for enabling programs to:...
Question 19: Which of the following application delivery mechanisms BEST ...
Question 20: Consider the following statements: (Exhibit) Given the input...
Question 21: Within a database, which of the following would be the best ...
Question 22: Given the following pseudocode: If the Breakfast program ran...
Question 23: Which of the following contains exactly four copper wires?...
Question 24: A programmer chooses a database for a new application that n...
Question 25: A customer is looking for a device that uses tap to pay when...
Question 26: Which of the following describes the concept of a database r...
Question 27: A regulation requires new applicants to provide a scan of th...
Question 28: Which of the following allows wireless devices to communicat...
Question 29: All users have access to an application at a company. The da...
Question 30: A technician travels to a data center to review specificatio...
Question 31: A systems administrator uses a program that interacts direct...
Question 32: Which of the following does a NoSQL database use to organize...
Question 33: Which of the following is an example of a compiled language?...
Question 34: Which of the following is MOST likely used to represent inte...
Question 35: A technician is called to replace a display for a workstatio...
Question 36: The IT department has established a new password policy for ...
Question 37: A company executive wants to view company training videos fr...
Question 38: Which of the following BEST describes a kilobyte?...
Question 39: An employee is asked to generate a report on a student infor...
Question 40: Which of the following is primarily a confidentiality concer...
Question 41: Which of the following relational database constructs is use...
Question 42: Given the following pseudocode: (Exhibit) If there are seven...
Question 43: SQL databases use primary and foreign keys to enable which o...
Question 44: When editing a document, which of the following describes wh...
Question 45: A user needs an interface that supports both video and data....
Question 46: A startup company has created a logo. The company wants to e...
Question 47: Malware infections are being caused by websites. Which of th...
Question 48: A developer is creating specific step-by-step instructions/p...
Question 49: Which of the following is secure?...
Question 50: Which of the following BEST describes the physical location ...
Question 51: A small company wants to set up a server that is accessible ...
Question 52: Which of the following best protects data in transit?...
Question 53: Which of the following is the most secure fllesystem?...
Question 54: Ann, a user, connects to the corporate WiFi and tries to bro...
Question 55: A user wants to use a laptop outside the house and still rem...
Question 56: A music studio needs to store artist data as text, demos as ...
Question 57: Which of the following would MOST likely prevent malware sen...
Question 58: Which of the following scripting languages is most likely to...
Question 59: A UPS provides protection against:...
Question 60: A technician has successfully verified full system functiona...
Question 61: Which of the following connection types is typically used fo...
Question 62: A database administrator wants to populate a database with l...
Question 63: Which of the following would MOST likely use an ARM processo...
Question 64: Which of the following storage types is MOST vulnerable to m...
Question 65: Joe, a user, finds out his password for a social media site ...
Question 66: A database administrator finds that a table is not needed in...
Question 67: A user is trying to set up a new wireless access point. Whic...
Question 68: Which of the following filesystems would a Linux computer MO...
Question 69: Which of the following are the primary functions of an opera...
Question 70: Which of the following computing devices would be used to pr...
Question 71: Which of the following is an example of utilizing a personal...
Question 72: Which of the following can a company use to protect its logo...
Question 73: When developing a game, a developer creates a boss object th...
Question 74: To establish a theory of probable cause, one technician inve...
Question 75: Which of the following file extensions is used for a consoli...
Question 76: Which of the following concerns does installing cross-platfo...
Question 77: A company is concerned with ensuring its databases are highl...
Question 78: Which of the following categories describes commands used to...
Question 79: Employee information is stored in a database. Which of the f...
Question 80: Which of the following database structures is the most granu...
Question 81: Which of the following is a logical structure for storing fi...
Question 82: A company has installed an application that only requires a ...
Question 83: An employee's laptop does not connect to the Internet when i...
Question 84: A technician has verified full system functionality. Which o...
Question 85: Which of the following computer components allows for commun...
Question 86: In which of the following situations should there be come ex...
Question 87: Which of the following software license models allows a deve...
Question 88: A technician is having trouble connecting multiple users' la...
Question 89: Ann, a user, is experiencing difficulty getting her IP-based...
Question 90: Which of the following protocols is used to relay email from...
Question 91: A programmer needs to store output in a place that can be ac...
Question 92: A help desk technician encounters an issue and wants to find...
Question 93: Which of the following commands would most likely be used to...
Question 94: A technician overhears a systems administrator mention the t...
Question 95: Users are required to install a certificate in order to acce...
Question 96: An IT manager wants to prevent end users from booting altern...
Question 97: Given the following pseudocode: (Exhibit) Which of the follo...
Question 98: A user needs to enter text and numbers to produce charts tha...
Question 99: A technician reading workstation security logs notices that ...
Question 100: Ann, the president of a company, has requested assistance wi...
Question 101: Employees must use a badge to enter and exit the building. E...
Question 102: Which of the following business continuity concepts is the b...
Question 103: A technician replaces the video card in a user's PC. The use...
Question 104: Which of the following would work BEST stored as a flat file...
Question 105: Which of the following is the exact number of bytes in a gig...
Question 106: A game developer is purchasing a computing device to develop...
Question 107: A remote user, who is working from home, requires significan...
Question 108: A new device has been installed on a wired network and can b...
Question 109: Which of the following BEST describes an application running...
Question 110: Which of the following would be used to send messages using ...
Question 111: Which of the following intellectual property concepts BEST r...
Question 112: Which of the following WiFi security options would create th...