I remember practicing a question similar to this, and I think identification of suitable candidates is important, but it might not be a core part of the plan.
I'm leaning towards saying that constraints applicable to a proposed Study should be included, but I can't recall if that's explicitly mentioned in the materials.
I'm a bit confused about the "who reported the phishing attempt" option. Does that mean the person who forwarded the email, or the person who was targeted? I'll have to think that one through.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Chantell
4 months agoBrandon
4 months agoMozell
4 months agoFiliberto
4 months agoLasandra
4 months agoBenton
5 months agoGerald
5 months agoLemuel
5 months agoCristy
5 months agoMicah
5 months agoDustin
5 months ago