The incident management step in which a user's problem is satisfactorily dealt with is called incident ____.

A. assignment
B. resolution
C. closing
D. archiving


Answer: B

Computer Science & Information Technology

You might also like to view...

The DOM defines ____, which are actions that are associated with an object.

A. modes B. methods C. events D. activities

Computer Science & Information Technology

When a worksheet is just a little too large to fit on a printed page, you can scale the worksheet to make it fit on the page.

a. true b. false

Computer Science & Information Technology

Which of the following firewall rules will block destination telnet traffic to any host with the source IP address 1.1.1.2/24?

A. Deny any source host on source port 23 to destination any B. Deny any source network 1.1.1.0/24 to destination any on port 23 C. Deny source host 1.1.12 on source port 23 to destination any D. Deny any source network 1.1.1.0/24 with source port 23 to destination any

Computer Science & Information Technology

You can use the ____________________ tool to restore painted pixels.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology