ITN 106 Test 3

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which type of script filename extension would be used to create a script file that extends the scope of interaction between a user and a web page? .sh .ps1 .js .bat

.js

Which of the following answers lists the filename extension of a Microsoft PowerShell script files? .vbs .py .sh .ps1

.ps1

Which of the following answers refers to an example of filename extension used in a cross-platform, general-purpose programming language? .py .bat .ps1 .vbs

.py

A stop error could manifest as which of the following? A BSOD An Event Viewer error An Action Center notification An Edge error

A BSOD

Which of the following are symptoms of viruses? (Select the three best answers.) A computer runs slowly. A computer is unable to access the network. Excessive pop-up windows appear. A strange website is displayed whenever a search is done. Unusual error messages are displayed.

A computer runs slowly. A computer is unable to access the network. Unusual error messages are displayed.

The chain of custody is: The chain used to lock up a system. Possible Answer ... Answer 2 Click to enter comments, if the student chooses this answer A document history of who has been in possession of a system A document history of software installed on system

A document history of who has been in possession of a system

Which of the following will bring a system back to its original state before a change was made? (Select the two best answers.) A responsible staff member Sandbox testing Undocumented business process Rollback plan

A responsible staff member Rollback plan

Which of the following extensions identify files that can be run as scripts? (Select all that apply.) A. .ps1 B. .exe C. .bat D. .docx E. .vbs F. .py G. .txt H. .sh

A. .ps1 C. .bat E. .vbs F. .py H. .sh

Which of the following is an integer? (Select the two best answers.) A. 16 B. cat C. string D. 00000001

A. 16 D. 00000001

You have been tasked with backing up new user profiles in an enterprise environment. You propose to back up these user accounts to a new tape backup device. Which of the following procedures should you follow? (Select the two best answers.) A. Change management B. End-user acceptance C. File History D. Incremental backup E. Backup testing

A. Change management E. Backup testing

You are the security administrator for your organization. You have just identified a malware incident. Of the following, what should be your first response? A. Containment B. Removal C. Recovery D. Monitoring

A. Containment

What is the term for a total loss of power that lasts for a prolonged period? A. Power failure B. Surge C. Spike D. Under-voltage event

A. Power failure

Which of the following is the best mode to use when scanning for viruses? A. Safe Mode B. Reset this PC C. Command Prompt only D. Boot into Windows normally

A. Safe Mode

Which of the following are good ideas when dealing with customers? (Select two.) A. Speak clearly. B. Ignore them. C. Avoid distractions. D. Explain to them what they did wrong.

A. Speak clearly. C. Avoid distractions.

A co-worker technician is using certmgr.msc to analyze a problem with a computer. Which of the following issues is the technician most likely troubleshooting? A. Trusted root CA B. Hijacked email C. Spyware D. Browser redirection

A. Trusted root CA

Which of the following are ways to avoid ESD? (Select three.) A. Use an antistatic wrist strap. B. Use a vacuum cleaner. C. Use an antistatic mat. D. Touch the chassis of the computer.

A. Use an antistatic wrist strap. C. Use an antistatic mat. D. Touch the chassis of the computer.

You are a field technician working at a customer's site. One of the workers asks you to load a copy of an organization's purchased software on a personal laptop. What should you do first? A. Verify that the installation is allowed under the company's licensing agreement. B. Act as though you are distracted and ignore the user. C. Leave the premises and inform the police. D. Tell the worker that installing unlicensed software is illegal. E. Notify the worker's manager of a security breach.

A. Verify that the installation is allowed under the company's licensing agreement.

You are working at a help desk and encounter an issue that has not been identified or worked on previously. You go through your troubleshooting methodology, research, and, finally, solve the problem. Which of the following should you do so that the issue can be addressed properly if it is encountered again? Add your findings to the knowledge base. Enter the resolution into the ticket and close it. Escalate the issue to your immediate supervisor. Email the rest of the technicians on the team, explaining the problem.

Add your findings to the knowledge base.

__________ bags help prevent ESD while parts are stored. Anti-Voltage Anti-Static Anti-Current Anti-ESD

Anti-Static

You have been asked by a customer at a hospital to perform routine maintenance on a laser printer. Before you begin, you notice that PHI has printed out. What should you do first? Ensure the paper tray is full so that everything can print. Place the printed output in a secure recycle bin and begin maintenance. Kindly warn the customer that printing PHI at work is a HIPAA violation. Ask the customer to move the printed output to another area.

Ask the customer to move the printed output to another area.

Which two methods would be the most effective in assisting with inventory management? (Choose two.) Incident documentation Regulatory and compliance policies Asset tags Barcodes

Asset tags, Barcodes

What should you type to comment out syntax in PowerShell? A. $ B. # C. // D. ()

B. #

A user tells you that her iPad cannot send a large document to an iPhone that is in close proximity. The user can't use the Internet because the network connection is too slow. You start investigating and find that Wi-Fi and Bluetooth are disabled. After you reenable them, the document is sent with no problems. Which of the following technologies was the user most likely trying to work with? A. NFC B. AirDrop C. Email D. Bluetooth

B. AirDrop

A co-worker complains that after the cleaning crew has come through, the keyboard irritates his hands and leaves some green residue. What should you do? A. Call the fire department. B. Contact the facilities department. C. Contact the manufacturer of the keyboard. D. Call OSHA and complain.

B. Contact the facilities department.

How will speaking with a lot of jargon make a technician sound? A. Competent B. Insecure C. Smart D. Powerful

B. Insecure

What document can aid you if a chemical spill occurs? A. HEPA B. MSDS C. OSHA D. EPA

B. MSDS

Which of the following could result from downloading something from an untrusted source? (Select all that apply.) A. Attestation B. Malicious apps C. Dead battery D. App spoofing

B. Malicious apps D. App spoofing

Which program enables a user to invite a technician to help repair their computer remotely? A. Remote Desktop Connection B. Remote Assistance C. RDP D. Remote connectivity

B. Remote Assistance

You are tasked with updating a network switch at a customer location. You need to make sure that data is not sent in plaintext over untrusted networks. Which of the following protocols should you implement? (Select the two best answers.) A. RDP B. SSH C. FTP D. SCP E. Telnet F. VNC

B. SSH D. SCP

It has been requested that your team make a significant change to the organization's infrastructure. What type of documentation should you look for in the change plan that would allow you to recover if you see that things are not going as hoped? Documented business processes Purpose of the change End-user acceptance Backout plan

Backout plan

Which of the following would help during a power outage? Battery Backup Surge suppressor Line conditioner Power Strip

Battery Backup

Which type of backup scheme uses two types of media, with one being stored offsite? A. GFS B. 10-tape rotation C. 3-2-1 D. Cloud storage

C. 3-2-1

What do inventory management systems and software use to keep track of assets? (Select the two best answers.) A. Regulatory policies B. AUPs C. Asset tags D. Barcodes

C. Asset tags D. Barcodes

Which of the following might cause a blue screen? A. A faulty USB port B. A CPU without a fan C. Bad drivers D. A program compatibility issue

C. Bad drivers

You are a technician working on a help desk. One of your customers installed a program to Windows that requires a license key. After the user contacted you, you accessed the customer's system and entered the license key manually. Which tool did you use to accomplish this? A. SSH B. FTP C. RDP D. rsync

C. RDP

You have been tasked with making a command-line-based remote connection to an Ubuntu Linux computer located on your LAN so that you can run two scripts on it as an administrator. What protocol should you use? (Select the best answer.) A. RDP B. mstsc C. SSH D. VPN

C. SSH

A user's computer is running very slow. You investigate and find out that there are many, many temporary files, caused by excessive browsing. Where would you go in Microsoft Edge to fix the problem? A. edge://settings/profiles/sync B. chrome://extensions C. edge://settings/privacy D. edge://settings/content

C. edge://settings/privacy

You find illegal materials on a customer's computer. Your boss commands you to preserve computer evidence until he gets to the scene. What is your boss asking you to begin? Documentation Chain of custody First response GDPR compliance

Chain of custody

You work with servers and network infrastructure in an IT department. You are proposing a major operating system upgrade to a Linux server. You have completed the documentation for this, and it shows that the upgrade will impact your organization's web services. You finish the required risk analysis and document the processes that will be required. Which of the following should you complete next? Rollback plan Change request Purpose of the change Scope of the change

Change request

A user reports that people are receiving emails from their account that they did not send. Which of the following security measures would best resolve the problem? Check the PC for malware Change the account's password Upgrade the e-mail client to a newer version Install a more expensive spam filter

Change the account's password

A user is connected to his personal mobile hotspot device at a library for Internet access. He notices the display shows two connections, instead of just one. Which of the following actions will prevent the intruders device? (Choose all that apply) Change the security on the hotspot Turn off the hotspot, and try later to see if the intruder has left Add the intruding device to a blocked access list Use the hotspot to access the intruder's device

Change the security on the hotspot, Add the intruding device to a blocked access list

Jack, an end user at your company, copied files from a USB thumb drive to his PC. When he was done, he updated his computer and restarted it. Then he received the error message "NO OS FOUND." Which of the following should you try first to fix the problem? Reboot the computer. Check the SATA cables. Check the BIOS/UEFI boot order. Uninstall, reinstall, and update applications. Perform a hardware diagnostics check.

Check the BIOS/UEFI boot order.

An electrical fire has started in your server room. Which type of fire extinguisher should you use? Class A Class B Class C Class D

Class C

You are tasked with repairing an issue with a Windows client computer that is attempting to log on to a domain. The user informs you that it takes 5 minutes to log on to the domain, but logging in to the local machine takes only 15 seconds. What steps should you take to fix the problem? (Select the two best answers.) A. Clean up temp files. Disable unnecessary services in MSConfig. Update the BIOS/UEFI boot order. Synchronize the Windows client's time to the domain controller Run ipconfig /release and ipconfig /renew.

Clean up temp files. Synchronize the Windows client's time to the domain.

What can you use to keep ventilation holes clear of dust? Lint-free cloth Vacuum Alcohol-based cleaner Compressed air canisters

Compressed air canisters

You are scripting in PowerShell and need to incorporate a construct that will repeat an operation until a specific requirement is met. What construct should you use, and which extension should you use to save the script? if-then logic and .sh String variables and .py Conditional loop and .ps1 Integers and .vbs

Conditional loop and .ps1

You spill a chemical on your hands. It does not appear to be life threatening. Which of the following statements best describes the recommended course of action? Call 911. Consult the MSDS for the chemical. Call the building supervisor. Ignore it.

Consult the MSDS for the chemical.

As part of the risk management of your company, you have been tasked with backing up three physical servers on a daily basis. These backups will be stored to a NAS device on the LAN. Which of the following can you do to make sure the backup will work if needed? Create alerts to let the administrators know when backups fail. Store copies of the backups offsite at a data center. Frequently restore the servers from the backup files and test them. Configure the backups to restore to VMs for rapid recovery.

Create alerts to let the administrators know when backups fail., Frequently restore the servers from the backup files and test them.

What should you avoid learning at all costs? Dependability Breaking customer equipment Customer's passwords Getting customer's location dirty

Customer's passwords

You have implemented a backup solution that combines a full backup on Monday at 6 p.m. and incremental backups on Tuesday through Friday at 6 p.m.. If there was a storage drive failure on Saturday morning, how many backup tapes would be required to restore the entire backup? A. 1 B. 2 C. 4 D. 5

D. 5

You walk into the server room and see a person lying on the floor with a live electrical wire draped over. What should you do first? Run out and call 911. Grab the wire and fling it off the person. Grab the person and drag him out from under the wire. D. Grab a piece of wood and use it to move the wire off the person.

D. Grab a piece of wood and use it to move the wire off the person.

Which of the following is not one of the steps of the incident response process? A. Eradication B. Recovery C. Containment D. Non-repudiation

D. Non-repudiation

Which type of regulated data is specifically protected under the HIPAA Privacy Rule? A. PII B. PCI C. GDPR D. PHI

D. PHI

A user downloaded an APK from an untrusted source and installed it. Now the mobile device is suffering from slow performance. The user also shows proof that the device is leaking data. What happened to the device? A. Jailbreaking B. Application spoofing C. Developer mode D. Rooting

D. Rooting

You are concerned with power outages that occur infrequently and for short periods of time. You don't want your users' computers to suffer from potentially harmful restarts. What device should you install for the users' computers? Surge protector Line conditioner C. MSDS D. UPS

D. UPS

Which of these is a group of security controls designed to restrict the usage or proliferation of copyrighted software and products? EULA Personal use license DRM Corporate use license

DRM

A client has a computer that is infected with several virus and spyware. Which of the following should the technician perform first before the virus and spyware removal? Run Windows Update Disable System Restore Run CHKDSK /R command Disable network card

Disable System Restore

What is the most important thing you should do at the completion of any work? Document your work Get paid Elicit solutions Elicit answers

Document your work

You have been tasked with repairing a computer that is exhibiting the following symptoms: [lb] Excessive pop-up windows appear. [lb] A particular website comes up every time the user searches. What is the most likely cause? Spam Virus Social engineering Trojan E Spyware

E Spyware

Which of the following can you use to map a network drive in PowerShell? apt install for loop restart-computer Install-WUUpdates E. New-PSDrive4.

E. New-PSDrive4.

From the concepts below, what can be the most harmful to computer systems? RFI ESD EMI

ESD

Which of the following should the technician do last after cleaning up a virus infection? Clear the event logs Update anti-virus software Schedule scans and updates Educate the end user

Educate the end user

Several computers were infected with malware after end users clicked unknown links embedded in emails. You have successfully applied the first six steps of the best practice procedures for malware removal. What should you do next? Schedule scans and run updates. Enable System Restore and create a restore point. Document findings, actions, and outcomes. Educate the end users.

Educate the end users.

You are working for Geeks of the Future, a company that solves home user technology issues. One of your customers tells you that his computer is suffering from slow performance as well as browser crashes. These issues began after the customer clicked a "repair" pop-up while browsing the Web. Which of the following should you perform first to resolve the issue? (Select the two best answers.) Enable the web browser's pop-up blocker. Scan the storage drive's boot sector and RAM with an antivirus program. Initiate a cold shutdown and then turn on the computer. Uninstall any recently installed suspicious programs and browser extensions. E. Run SFC and replace changed files with the original system files.

Enable the web browser's pop-up blocker. Uninstall any recently installed suspicious programs and browser extensions.

Which of the following is the best license type to comply with EULA terms for commercial software used by multiple users in a corporate environment? Personal license Enterprise license Open-source license Commercial license

Enterprise license

A technician receives an error every time a workstation boots up. The technician needs to find out what process is responsible for the error. Which of the following utilities would be used first? Control Panel Task Manger Event Viewer MSCONFIG

Event Viewer

You have been tasked with implementing ad blocking functionality within a web browser. Which of the following should you add to make ad blocking a reality? Extension Valid certificate Pop-up blocker Password manager

Extension

You suspect that a mobile device has been compromised and is now part of a botnet. What are some of the indicators that this has happened? (Select the two best answers.) High resource usage Notification of camera/webcam usage Apps force stopped Power drain Log files unavailable Locked user account

High resource usage Power drain

Your boss asks you to troubleshoot a computer with a virus. Which of the following statements best describes the first step you should take to remedy the problem? Run a System Restore. Identify the malware. Roll back drivers. Research malware types.

Identify the malware.

You work as a technician for an organization that has a custom web-based application that is used for the monitoring of networking devices. While using a web browser to access the application, you press F12, and within the js folder, you see the following code: $(function() { // Attach collapsible behavior to select options (function() { var selects = $('select[data-toggle="collapse"]'); Python PowerShell JavaScript Visual Basic Script

JavaScript

A technician just finished scripting a sequence of code and saved the script as a .sh file. What system is the technician working in? PowerShell Linux JavaScript Python Batch file

Linux

Which of the following answers refers to a basic programming construct that repeats a sequence of instructions until a specified condition is reached? Function Loop Conditional statement Switch statement

Loop

You want to list a variable number 16 times but don't want to type 16 lines of code. Which of the following techniques should you use? if-then Looping Environment variables Comment syntax

Looping

You have been tasked with fixing a problem on a Windows server. You need to find out which switch it connects to and how it connects. Which of the following types of documentation should you consult? Microsoft Knowledge Base Network topology diagram Incident documentation Compliance policy Inventory management

Network topology diagram

A technician has removed some malware from a system but the user stated that she is being redirected to some web sites such as Windows Update. Which of the following is the most likely cause of the issue? NIC driver is corrupt Reinstall windows The web browsers cache is full Not all the malware has been removed

Not all the malware has been removed

A user receives an email containing a co-workers birth data and social security number. The email was not requested and it had not been encrypted. What policy does the information in the email violate? EULA PII DRM IRP

PII

Which of the following is considered to be government-regulated data? DRM EULA PII DMCA

PII

Which of the following are valid Wi-Fi troubleshooting methods? (Select the two best answers.) Power cycle the device. Restart Bluetooth. Use a static IP address. Make sure the device is within range. Rename the SSID of the AP.

Power cycle the device. Make sure the device is within range.

Which of the following is the best Windows utility to use if an administrator wants to perform administrative tasks that integrate scripts over a network? PowerShell Command Prompt Bash Command-line

PowerShell

You are tasked with removing malware from a Windows computer. You already performed research on the malware and have determined that it is a memory virus. Which step should you take next? Educate the user. Quarantine the affected system. Remediate the affected system. Disable System Restore points.

Quarantine the affected system.

__________ can affect Bluetooth and wireless networks, among other equipment. ESD - Electrostatic Discharge EMI -Electro-Magnetic Interference RFI - Radio Frequency Interference EFS- Encrypting File systems

RFI - Radio Frequency Interference

You are troubleshooting a tablet PC that has a frozen application. You have attempted to end the underlying task of the application but have not succeeded. Which of the following statements best describes the next recommended course of action? Turn off then wait a minute then start Force quit the app Reboot

Reboot

You work in a multinational organization. Your colleagues in Germany ask how you are doing with GDPR. To what do they refer? Password policy Regulatory and compliance policies Incident documentation Knowledge base/articles

Regulatory and compliance policies

Which of the following sends an invitation by email asking for help? Remote Desktop Connection Service call VNC Remote Assistance

Remote Assistance

If a power supply fails, what should you do? Replace it. Repair it. Use a different computer. Switch it to a different voltage setting.

Replace it.

A technician is called onsite to solve a network connection error. Upon arrival, the A technician observes a message on the screen stating there is no boot drive found. Which of the following steps should the technician take next? Repair the boot sector using recovery console Restart the system, booting from a system recovery disc Restart the system to verify the proper boot order Replace the hard drive

Restart the system to verify the proper boot order

In a change management board meeting, you are discussing any vulnerabilities that can be mitigated as part of a recommended change and anything that could potentially occur due to that change. What best describes what you are discussing? Purpose of change Scope of the change Backout plan Document changes Risk analysis

Risk analysis

ou are documenting the proposal for a major change. What part of the documentation would address the potential impact of failure? Scope the change Documented business processes Risk analysis Backout plan

Risk analysis

One of your customers updated the software for a wireless adapter on a PC. After rebooting, the user logged in, and the computer displayed a blue screen. What should you do? Install the device on a known good computer. Reboot the computer and access debugging mode. Purchase a new wireless adapter. Roll back the device drivers in Safe Mode.

Roll back the device drivers in Safe Mode.

A technician suspects protected Windows system files may be corrupt. What should the tech do first to verify these suspicions and fix any potential problems? Run a system file check (SFC) Roll back updates. Restart all services. Rebuild Windows profiles.

Run a system file check (SFC)

This connection type is typically considered to be a secure way to connect to remote system that uses command line interface. RDP RDC SSH Telnet

SSH

Which option starts the operating system with a minimal set of drivers? Windows RE System Restore Safe Mode Debugging Mode

Safe Mode

An application won't close on an Android smartphone. You've tried to force stop it—to no avail. What should you do? Hard reset the device. Stop the underlying service in Running Services. Soft reset the device. Take the device to an authorized service center.

Soft reset the device.

A customer experiences a server crash. When you arrive, the manager is upset about this problem. What do you need to remember in this scenario? Stay calm and do the job as efficiently as possible. Imagine the customer in his underwear. Avoid the customer and get the job done quickly. Refer the customer to your supervisor.

Stay calm and do the job as efficiently as possible.

You want a cost-effective solution to the common surges that can affect your computer. Which device offers the best solution? UPS Surge suppressor Power strip Rack grounding

Surge suppressor

Which tool can be used to restore a computer? bootrec /fixboot System Restore Windows Troubleshooter MSConfig

System Restore

You want to verify that Google Chrome will connect to websites in a secure manner. Where should you go to confirm this? (Select the two best answers.) PGP key TLS setting (1.2 or higher) Installation file signature from a trusted source Incognito mode Trusted zones in Internet Properties > Security

TLS setting (1.2 or higher) Trusted zones in Internet Properties > Security

A technician has turned the Portrait Orientation Lock off for an iPhone user. Which common mobile OS problem does this rectify? The Camera app fails to launch. The screen does not autorotate. The OS fails to update. The battery fails to hold a charge.

The screen does not autorotate.

Which of the following statements best describes how to reduce the chance of ESD? (Choose all that apply) Use an antistatic strap. Use an antistatic mat. Work in a carpeted area. Raise the humidity.

Use an antistatic strap. Use an antistatic mat Raise the humidity.

You are in charge of setting up the administrators' connections to remote Windows computers located at satellite offices using RDP. What are some of the ways to make these connections more secure? (Select the three best answers.) Use strong passwords Use OpenSSH Use network-level authentication Use PuTTY Use L2TP and IKEv2

Use strong passwords Use network-level authentication Use L2TP and IKEv2

You are troubleshooting a computer that has a web browser issue. The end user says that multiple browser pages open by themselves when surfing the Internet. Also, you observe that the computer is running slowly. Which of the following actions should you perform first? Verify it has anti-malware software. Update antivirus definitions. Reboot the computer. Enable a pop-up blocker.

Verify it has anti-malware software.

Which of the following are symptoms of malware on a PC? (Choose all that apply) When the system is idle, there is network and hard drive activity When you browse the Internet, you are redirected to Web sites that you did not click on. When the system prints, it prints nothing but random characters and symbols instead of regular text.

When the system is idle, there is network and hard drive activity, When you browse the Internet, you are redirected to Web sites that you did not click on.

Which tool should be used if you want to use Startup Repair in Windows? File History Windows RE System Restore Safe Mode

Windows RE

You work for an enterprise-level organization that is ISO 27002:2013 certified. You have been tasked with adding a group of Windows client computers with a new image configuration to the IT asset inventory database, and this task has a standard procedure. You must furnish a document to be signed off by two people. Who should you approach for signatures? (Select the two best answers.) Your manager Compliance officer IT director Owner of the company CISO

Your manager IT director

A user has contacted you requesting help with an operating system configuration issue. From your computer, you configure an Offer Remote Assistance invitation. What is a valid reason for not being able to create a Remote Assistance connection to the user's computer? Your user account is not a member of the Administrators group on your computer. Your user account is not a member of the Power Users group on your computer. Your user account is not a member of the Administrators group on the user's computer. Your user account is not a member of the Power Users group on the user's computer.

Your user account is not a member of the Administrators group on the user's computer.

You are working for a company as a roaming PC tech and have been assigned work by a network administrator. The admin notifies you that the company is experiencing a DDoS attack. Half a dozen internal Windows PCs are the source of the traffic. The admin gives you the Windows computer names and tells you that they must be scanned and cleaned immediately. Which of the following effects to the PCs should you as a PC technician focus on fixing? (Select two) Zombies Ransomware Spyware Worm

Zombies, Worm

Wendy has decided to implement an uninterruptible power supply for several servers. Which functions can it provide her? (Choose all that apply.) data backup a warning when the power source fails short-term battery backup surge protection

a warning when the power source fails, short-term battery backup, surge protection

Which type of script file would be used to store a series of commands designed to automate tasks in DOS, OS/2 and Microsoft Windows? py sh bat js

bat

Shelly was in the workout room listening to her music via her Bluetooth headphones on her iPhone 6 which was in her pocket. Later she went into the sauna, where she noticed her music stopped playing even though the iPhone was located in a pocket of her robe she was wearing. What most likely happened? Headphones lost power iPhone overheated Lost WiFi signal Lost Bluetooth signal

iPhone overheated

You are instructing your company's IT technicians on how to calibrate the screen of a touch screen device. The technicians will need to perform this step only in certain conditions. Which conditions will require this? (Choose all that apply.) nothing happens when touching an application battery dies incorrect application opens dirty screen

nothing happens when touching an application, incorrect application opens

A basic data type designed to contain text information is known as: string constant integers variable

string


Conjuntos de estudio relacionados

Ch. 6: Recognizing, Analyzing, and Constructing Arguments

View Set

Chapter 4: Managing Marketing Information to Gain Customer Insights

View Set

chapter 8 - articulations (espinoza)

View Set

Ch. 26 Deceptive Sales Practices

View Set

Performance Appraisal Rating Errors

View Set