Tag: Chapter 13

It-essentials v7.0 Chapter 13 Exam Answers

It-essentials v7.0 Chapter 13 Exam Answers 1. Which two items are used in asymmetric encryption? (Choose two.) a token a DES key a private key * a public key * a TPM 2. Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose …

It-essentials v6.0 Chapter 13 Exam Answers 2018

1. What is the correct way to conduct a telephone call to troubleshoot a computer problem? Always gather information from the customer and escalate the problem. Maintain professional behavior at all times.* Ask personal questions to get better acquainted with the customer. Explain each step to help the …