What is the third step of troubleshooting?
A) Establish a theory of probable cause.
B) Test a theory to determine the cause.
C) Identify the problem.
D) Establish a plan of action.
B
You might also like to view...
To recover from a system lockout in Android, enter your Google login information
Indicate whether the statement is true or false
Spyware can be used in a computer-based espionage to collect sensitive information
Indicate whether the statement is true or false.
Within a data classification scheme, "comprehensive" means that an information asset should fit in only one category.
Answer the following statement true (T) or false (F)
________ is a hybrid version of Ethernet that uses either 10Base-T or 100Base-T.
a. Mullion Ethernet b. Base-T Ethernet c. 10/100 Ethernet d. Token ring Ethernet e. FDDI Ethernet