Which of the following is an example of an inappropriate use of the company network?
A) Checking competitors’ websites to see what products they offer
B) Using the web to search for a new job
C) Booking a business trip
D) Doing research for a business-related project
B) Using the web to search for a new job
You might also like to view...
To see the available themes, view the thumbnails located in the Themes ________
A) Album B) Folder C) File D) Gallery
To move a text box label, what action must you take?
A) Click the Tabular Layout in the Table group of the Arrange tab while both the label and text box controls are selected. B) Click the Tabular Layout in the Arrange group when the label is selected. C) Click the Tabular Layout in the Arrange group when the text box is selected. D) Click the Tabular Layout in the Arrange group of the Table group while the label and text box are selected.
____ is a set of tools designed to provide multitiered security capabilities for protecting data by classifying data for which access rights and privileges are then assigned and monitored.
A. Multilayer Security B. Privileges Monitor C. Class Monitor D. Label Security
DISM enables an administrator to mount an image file, similar to mounting a hard disk, and issue commands to update the image
Indicate whether the statement is true or false