A technician discovers that multiple switches require a major update. Which of the following policies should be followed?

A. Change management policy
B. Remote access policy
C. Acceptable use policy
D. Memorandum of understanding


Answer: A. Change management policy

Computer Science & Information Technology

You might also like to view...

Explain how the onmouseover and onmouseout events work.

What will be an ideal response?

Computer Science & Information Technology

How many bytes does the following code write to file dest?

1. try { 2. FileOutputStream fos = newFileOutputStream("dest"); 3. DataOutputStream dos = new DataOutputStream(fos); 4. dos.writeInt(3); 5. dos.writeDouble(0.0001); 6. dos.close(); 7. fos.close(); 8. } 9. catch (IOException e) { } A. 2 B. 8 C. 12 D. 16 E. The number of bytes depends on the underlying system.

Computer Science & Information Technology

You create a named range by using the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which NTFS permission for a folder is defined as enabling you to read, write, and delete both files and subfolders?

A. Full Control B. Modify C. List Folder Contents D. Read

Computer Science & Information Technology