You are on a service call to fix a customer's printer when she asks you to install a software package. The software is on a personally made CD with the key written on it. You suspect the software is pirated. What do you do?
A) Install the software.
B) Inform the customer that installing pirated software is a criminal offense.
C) Call your supervisor.
D) Report it immediately to the customer's supervisor.
B
You might also like to view...
What are the three different methods for performing a loop in C++?
What will be an ideal response?
Examples include smartphones, laptops, tablets, and gaming devices. All of these devices are extremely powerful and utilize wireless technology to connect to the network.
What will be an ideal response?
Case 19-2 Cindy, an intern at a publishing house, has to use Microsoft Access 2016 to prepare forms and database reports for all the outgoing articles in that particular month. Since the records are huge, Cindy uses wildcard characters to perform searches in the report. Which of the following wildcard searches will enable Cindy to find the term "Filler" in the report?
A. ?F_ller B. ?F[aeiu]ller C. ?F#ller D. ?F?a?e?i?ller
Which of the following sources would a security analyst rely on to provide relevant and timely threat information concerning the financial services industry?
A. Real-time and automated firewall rules subscriptions B. Open-source intelligence, such as social media and blogs C. Information sharing and analysis membership D. Common vulnerability and exposure bulletins