The incident management step in which a user's problem is satisfactorily dealt with is called incident ____.
A. assignment
B. resolution
C. closing
D. archiving
Answer: B
You might also like to view...
The DOM defines ____, which are actions that are associated with an object.
A. modes B. methods C. events D. activities
When a worksheet is just a little too large to fit on a printed page, you can scale the worksheet to make it fit on the page.
a. true b. false
Which of the following firewall rules will block destination telnet traffic to any host with the source IP address 1.1.1.2/24?
A. Deny any source host on source port 23 to destination any B. Deny any source network 1.1.1.0/24 to destination any on port 23 C. Deny source host 1.1.12 on source port 23 to destination any D. Deny any source network 1.1.1.0/24 with source port 23 to destination any
You can use the ____________________ tool to restore painted pixels.
Fill in the blank(s) with the appropriate word(s).