A wrist grounding strap should be worn to repair a _____________?
CRT monitor
power supply
system board
laser printer
DDR rating on a stick of SDRAM refers to __________ and it performs operations on both the rise and fall of the clock cycle?
Data Density RAM
Double Data Rate
Double Density RAM
Double Density Rate
A feature that allows certain hardware to directly access the system memory, bypassing the CPU?
IRQ
ATX
DMA
PCI
The ________ is the circuit board upon which the processor, memory, and expansion cards are mounted?
motherboard
HDMI board
graphic card
NIC card
During bootp-up, which key squence must a technician press to get the Recovery Options in Windows 7?
F2 then choose Safe Mode with Networking
F2 then choose Safe Mode
F8 then choose Safe Mode with Networking
F2 then choose Repair Your Computer
In Windows, what can a technician do to find a list of services that start when a system boots up?
Check in the Windows/System 32 folder
Look in the Documents and Settings folder
Run the msconfig System Configuration Utility
Look at the first tab of the System Properties
The three MOST important things to consider on any large scale computer systems network project are budget, scope and______?
time
location
equipment
personnel
What is the network address class for 193.27.3.4?
Class A
Class B
Class C
Class D
What portionof the Class A address 126.45.3.7 is the network address?
126
126.45
126.45.3
45.3.7
A router using RIP updates the routing table every _______ seconds?
15
30
45
60
A network that uses a public telecommunication infrastructure to provide remote users with secure access to their organizations network is known as a _______?
Metropolitan Area Network
Local Area Network
Virtual Private \ Network
Multi Location Network
To connect a Cat-6 cable to a wall mounted network port, an __________ connector is necessary?
RJ-11
RJ-14
RJ-25
RJ-45
The 568A and 568B standards were established by
Microsoft
EPA
ISO
EIA/TIA
Two devices transmitting on a shared medium at the same time is__________?
merging
interface
collision
blockage
Which of the following is described as the physical arrangement of network nodes and media within a network structure?
LAN
VLAN
topology
traffic filtering
Which of the following LAN topologies has each network host connected to a central hub aand connects each node to the hub with a point-to-point connection?
bus
star
ring
tree
Category-6 cable has _______ pairs of twisted wires?
2
4
6
8
Which of the following types of media is the least susceptible to lightning strike?
UTP
Fiber Optic
coaxial
STP
Category-6 cable has _______ of twisted wires?
2
4
6
8
Which of the following is connected to the PC by the NIC?
network
router
CPU
system board
The 802.11 standard uses the _____ transmission method?
SSID
ATM
CSMA/CD
CSMA/CA
In the OSI Model, Layer 3 is the __________layer?
data link
application
network
presentation
In the OSI Model, the layer that establishes, manages, and terminates connections between applications is the ________ layer?
data link
transport
physical
session
Which of the following layers of the OSI Model provides the electrical and mechanical transmission of data?
data link
transport
physical
session
A signal losing strength over a given distance is known as
Attenuation
Interference
collision
cessation
What type of cable should a technician choose when connecting a switch to another switch?
crossover
patch
rollover
serial
The Tracert utility is commonly used to test?
a path taken by packets
IP activity
email activity
certificate achievement
A system or group of systems that enforces an access control policy between two networks is known as a _____?
firewall
hub
password
cache
Which of the following is the most secure password?
MotherK
R#$34wb*e
54321
34ElDmdg27k
Which of the following prevents, detects, and removes viruses, worms, and Trojan horses?
firewall
host address
virus protection
convergence
Which of the following is an example of information theft?
destroying data on a hard drive
overloading a server to prevent legitimate requests
manipulating data
stealing information to gain a competitve edge
A program that can gather personal information from a computer without the user's knowledge is commonly called?
pop-up
spyware
DoS
spam
Which of the following is most likely a symptom of the DoS?
Computer on the network has crashed
Router is unable to find a destination outside of the network
Web server has gone into loop trying to service a client request
Keyboard is no longer responding
What security threat uses social engineering?
denial of service
phishling
ping of death
worm
Which of the following can use used to provide security for a secrurity for a VPN?
PPTP
IPSec
Keberos
certificate
Troubleshooting is as much about communicating with the customer as it is about knowing how to fix a computer?
True
False
To troubleshoot a computer, you need to learn the very little details of the problem from thecustomer?
True
False
A relaxed customer is more likely to be able to provide the _________ that you need to determine the source of the problem and then fix it?
Trust
Tone
Information
Misunderstanding
When you are talking with a customer over the phone, that customer can hear your ________ and _________?
tone
typing skills
inflection
Poor listening skills
Customers can also sense whether you are smiling when you are speaking withthem on the phone?
True
False
A knowledgeable technician who uses good communication skills will not be in demand in the jobs market?
True
False
The IT technician has access to several _________ and ____________ tools?
computers
communication
co workers
research
It is harmful to gather information for the troubleshooting process?
True
False
An IT technician must know, relate and understand the client?
True
False
Which one applies when an IT technician: Call the customer by his or her name?
Know
Relate
Understand
None of the above
An IT technician should never ask if there is any name that they prefer you use?
True
False
Which one applies when an IT technician: Create a one-to-one connection between you and your customer?
Know
Relate
Understand
None of the above
If you hear a dog barking in the background of the call and you have a dog, then briefly ask the client to go into another area where you can not hear the dog?
True
False
Determining your customer's level of knowledge about the computer to help you best communicate with them is an example of which of the follow?
Know
Relate
Understand
None of the above
Allowing the customer to tell the whole story. During the time that the customer is explaining the problem is considered annoying?
True
False
Listening carefully when your customers speak and let them finish their thoughts is which of the following?
Passive Listening
Active Listening
Ineffective Communication
None of the above
Follow-up questions should not be targeted, closed-ended questions based on the information that you have already gathered.
True
False
After listening to the customer explain a small part of the problem, summarize what the customer has said is considered which of the following?
Passive Listening
Active Listening
Ineffective Communication
None of the above
The customer should be able to answer a closed-ended question with a simple “yes” or “no” or with a factual response?
True
False
Communication Skills, Troubleshooting and the IT Professional establishes good communication skills when a technician does which of the following?
Present yourself professionally
Be emotional
Talk to other people while the client is explaining their problem