Quiz 3 ITEv8 (Ch 8 9 10 13 14)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What are two types of computer user interface? (Choose two.)

CLI GUI

How could a user share a locally connected printer with other users on the same network?

Enable print sharing.

What contains information on how hard drive partitions are organized?

MBR

Which file system is used to access files over a network?

NFS

A technician working on a computer discovers what is suspected to be illegal activity. Which three pieces of information should be immediately documented? (Choose three.)

evidence of the suspected illegal activity why the computer was accessed by the technician

A programmer is building a script in order to calculate the corporate bank account balance within two decimal places. Which data type would be used in the script to represent the balance?

float

What two roles or tasks are associated with the level one technician? (Choose two.)

gathering customer information to initiate a work order escalating a trouble ticket to a level two technician

In which situation would it be appropriate for a technician to back up personal and confidential data from a computer belonging to a customer?

if the customer permits it

Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)

ports protocols

A technician is asked to set up one hard drive that will support two operating systems and will store data files in three separate drive locations. Which partition settings will support these requirements?

2 primary, 1 active, 1 extended, 3 logical

A technician is attempting to create multiple partitions on a hard disk that is using the boot sector standard that supports a maximum partition size of 2TB. What is the maximum number of primary partitions allowed per hard drive?

4

What is the maximum amount of physical RAM that can be addressed by a PC running 32-bit Windows 10 Pro?

4 GB

A programmer uses an operator to compare two variable values within a program. The variable A is assigned a value of 5 and the valuable B is assigned a value of 7. Which condition test syntax would have provided the result of "true"?

A != B

What is considered ethical behavior by a technician when communicating with a customer?

A technician must only send solicited emails.

What is a characteristic of a virtual machine running on a PC?

A virtual machine runs its own operating system.

Which type of user account is created automatically and enabled during a Windows 10 installation?

Administrator

Which statement describes a characteristic of cloud computing?

Applications can be accessed over the Internet through a subscription.

A technician has recently changed jobs from supporting a small company to a large company in the security group. What are two types of passwords the larger company could use to secure a workstation? (Choose two.)

BIOS login

A corporate executive has asked the IT department to provide a solution to ensure data security of removable drives that are being taken off the premises. Which security solution should be recommended?

BitLocker To Go

What is the difference between a data center and cloud computing?

Cloud computing provides access to shared computing resources, while a data center is a facility that stores and processes data.

Which action could be used to determine if a host is compromised and flooding traffic onto the network?

Disconnect the host from the network.

What is the first action that should be taken when performing preventive maintenance on a printer?

Disconnect the printer from the power source.

When a support technician is troubleshooting a security issue on a system, which action should the technician take just before documenting the findings and closing the ticket?

Ensure that all applications are working.

A college is exploring options to outsource the student email service to a cloud provider. Which two solutions will help the college to achieve the task? (Choose two.)

Gmail Exchange Online

A small advertising company is considering outsourcing the information technology services to a cloud provider. The services would include user training, software licensing, and provisioning. What cloud service would the company consider purchasing?

IT as a service (ITaaS)

A technician discovers that an employee has attached an unauthorized wireless router to the company network so that the employee can get Wi-Fi coverage while outside taking a break. The technician immediately reports this to a supervisor. What are two actions that the company should take in response to this situation? (Choose two.)

Immediately remove the device from the network. Consult the company security policy to decide on actions to take against the employee.

What are two closed-ended questions that a technician could ask a user while trying to identify the problem with a printer? (Choose two.)

Is the printer powered on? Can you print a test page on the printer?

Once a technician understands a customer complaint, it is common to ask closed-ended questions. Which question is a close-ended one?

Is this the first time the error occurred?

Which statement best describes a call center?

It is a place to provide computer support to customers.

Which statement describes the print buffering process?

Large documents are stored temporarily in internal printer memory while waiting for the availability of the printer.

What is the correct way to conduct a telephone call to troubleshoot a computer problem?

Maintain professional behavior at all times.

A customer is upset and wants to speak to a specific technician to resolve a problem immediately. The requested technician is away from the office for the next hour. What is the best way to handle this call?

Make an offer to help the customer immediately, and advise the customer that otherwise the requested technician will call the customer back within two hours.

A technician in a small business is configuring the local security policy for a computer. Which configuration setting would the technician use to require the user to change the password after 90 days?

Maximum password age

What is the default file system used during a fresh installation of Windows 10?

NTFS

What type of file system allows the use of files larger than 5 GB and is mostly used on internal hard drives?

NTFS

What are two advantages of the NTFS file system compared with FAT32? (Choose two.)

NTFS supports larger partitions. NTFS provides more security features.

A research and development group has members from different company locations. The group is looking for a central file storage solution to store research-related documents. What are two possible solutions? (Choose two.)

OneDrive Google Drive

Which programming language utilizes scripts that are interpreted and executed line by line when the script is run?

PowerShell

What are two potential disadvantages of replacing printer consumables with parts or components that are not recommended by the manufacturer? (Choose two.)

Print quality may be poor. The manufacturer warranty may be voided.

Which situation would require that a support desk call be given the highest priority?

The company cannot operate because of a system failure.

What are two disadvantages of sharing a directly connected printer from a computer? (Choose two.)

The computer sharing the printer uses its own resources to manage all the print jobs coming to the printer. The computer directly connected to the printer always needs to be powered on, even if not in use.

While troubleshooting a printer problem, a technician discovers that the printer has been connected to the wrong computer port. Which printer problem would this mistake have caused?

The print queue is functioning, but print jobs are not printed.

A small company is deciding whether a laser printer should be purchased to replace an inkjet printer. What are two disadvantages of laser printers? (Choose two.)

The start-up cost is high. Toner cartridges are expensive.

A supervisor received a complaint that one of the technicians was rude and disrespectful. Which action by the technician most likely caused the customer to complain?

The technician interrupted a number of times to ask questions.

What approach should a technician take when receiving a call from a stressed customer?

Try to establish a rapport with the customer.

To which category of hypervisor does the Microsoft Virtual PC belong?

Type 2

Which method is recommended for cleaning the print heads in an inkjet printer?

Use the printer software utility.

The IT department in a company is looking for a solution to consolidate the functionality of several mission critical server computers into VMs on a few high performance host machines. Which two hypervisors should be considered? (Choose two.)

VMWare vSphere Oracle VM Server

A customer is explaining a problem with a computer to a technician. The technician recognizes the problem prior to the customer finishing the explanation. What should the technician do?

Wait politely for the customer to finish explaining the problem.

Which type of document typically takes the longest time to print?

a digital color photograph

A technician wants to share a printer on the network but according to the company policy, no PC should have a directly connected printer. Which device would the technician need?

a hardware print server

Which user account should be used only to perform system management and not as the account for regular use?

administrator

Which is an example of social engineering?

an unidentified person claiming to be a technician collecting user information from employees

What action should a technician avoid when dealing with a talkative customer?

asking social questions such as "How are you today?"

How does cloud computing improve the performance and user experience of an online version of office productivity tools?

by providing application code as needed

What software enables users to set and change printer options?

configuration software

As data is being stored on a local hard disk, which method would secure the data from unauthorized access?

data encryption

For a large enterprise deploying virtualized servers, what are two benefits of using a bare metal hypervisor solution instead of a hosted hypervisor solution? (Choose two.)

direct access to hardware resources increased efficiency

What term is used to describe dual-sided printing?

duplex printing

A technician has recently joined an organization and during the first week on the job, discovers a security breach. What policy should the technician implement after the security breach has occurred?

incident handling policy

Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company?

infrastructure as a service (IaaS)

What category of technician uses remote access software to update a computer belonging to a customer?

level two technicians

Which type of hard drive format is commonly performed at the factory where the drive is assembled?

low-level

What term is used to describe a logical drive that can be formatted to store data?

partition

When configuring Windows security, which term is used to mean a rule assocated with an object such as a folder or printer?

permission

Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?

phishing

A corporate employee has recently taken the mandated security awareness training and is wanting to use the correct security term. Which issue can occur when browsing the internet and is often initiated by the destination website?

pop-up

Dots per inch is used as a measure for which characteristic of a printer?

quality of printing

When a user turns on the PC on Wednesday, the PC displays a message indicating that all of the user files have been locked. In order to get the files unencrypted, the user is supposed to send an email and include a specific ID in the email title. The message also includes ways to buy and submit bitcoins as payment for the file decryption. After inspecting the message, the technician suspects a security breach occurred. What type of malware could be responsible?

ransomware

Which statement describes the concept of cloud computing?

separation of application from hardware

A company uses a cloud-based payroll system. Which cloud computing technology is this company using?

software as a service (SaaS)

Which location on a hard disk is used by the BIOS to search for operating system instructions in order to boot a PC?

the active partition

A Windows 10 computer has several printers configured in the Control Panel Devices and Printers window. Which printer will the computer choose to be the first option for printing?

the printer that is set as the default printer

What are two examples of displaying professional communication skills while talking to a customer? (Choose two.)

the use of active listening, with occasional interjections such as "I see" or "I understand" clarifying what customers say after they have finished their explanations

A small business has connected several printers to the web using Google Cloud Print. Mobile workers can then print job orders while they are on the road. This is an example of using what type of printer?

virtual

Which term is associated with Cloud computing?

virtualization


Ensembles d'études connexes

Servers3.1 - Implementing Hyper V & Virtual Networks

View Set

WEEK 11 ADN220 [THE CONCEPT OF FAMILY]

View Set

Chapter 7: Managing Stress and Emotions

View Set

What are the three parts of an ATP molecule

View Set