A wrist grounding strap should be worn to repair a _____________?
Question 2
2.
DDR rating on a stick of SDRAM refers to __________ and it performs operations on both the rise and fall of the clock cycle?
Question 3
3.
A feature that allows certain hardware to directly access the system memory, bypassing the CPU?
Question 4
4.
The ________ is the circuit board upon which the processor, memory, and expansion cards are mounted?
Question 5
5.
During bootp-up, which key squence must a technician press to get the Recovery Options in Windows 7?
Question 6
6.
In Windows, what can a technician do to find a list of services that start when a system boots up?
Question 7
7.
The three MOST important things to consider on any large scale computer systems network project are budget, scope and______?
Question 8
8.
What is the network address class for 193.27.3.4?
Question 9
9.
What portionof the Class A address 126.45.3.7 is the network address?
Question 10
10.
A router using RIP updates the routing table every _______ seconds?
Question 11
11.
A network that uses a public telecommunication infrastructure to provide remote users with secure access to their organizations network is known as a _______?
Question 12
12.
To connect a Cat-6 cable to a wall mounted network port, an __________ connector is necessary?
Question 13
13.
The 568A and 568B standards were established by
Question 14
14.
Two devices transmitting on a shared medium at the same time is__________?
Question 15
15.
Which of the following is described as the physical arrangement of network nodes and media within a network structure?
Question 16
16.
Which of the following LAN topologies has each network host connected to a central hub aand connects each node to the hub with a point-to-point connection?
Question 17
17.
Category-6 cable has _______ pairs of twisted wires?
Question 18
18.
Which of the following types of media is the least susceptible to lightning strike?
Question 19
19.
Category-6 cable has _______ of twisted wires?
Question 20
20.
Which of the following is connected to the PC by the NIC?
Question 21
21.
The 802.11 standard uses the _____ transmission method?
Question 22
22.
In the OSI Model, Layer 3 is the __________layer?
Question 23
23.
In the OSI Model, the layer that establishes, manages, and terminates connections between applications is the ________ layer?
Question 24
24.
Which of the following layers of the OSI Model provides the electrical and mechanical transmission of data?
Question 25
25.
A signal losing strength over a given distance is known as
Question 26
26.
What type of cable should a technician choose when connecting a switch to another switch?
Question 27
27.
The Tracert utility is commonly used to test?
Question 28
28.
A system or group of systems that enforces an access control policy between two networks is known as a _____?
Question 29
29.
Which of the following is the most secure password?
Question 30
30.
Which of the following prevents, detects, and removes viruses, worms, and Trojan horses?
Question 31
31.
Which of the following is an example of information theft?
Question 32
32.
A program that can gather personal information from a computer without the user's knowledge is commonly called?
Question 33
33.
Which of the following is most likely a symptom of the DoS?
Question 34
34.
What security threat uses social engineering?
Question 35
35.
Which of the following can use used to provide security for a secrurity for a VPN?
Question 36
36.
Troubleshooting is as much about communicating with the customer as it is about knowing how to fix a computer?
Question 37
37.
To troubleshoot a computer, you need to learn the very little details of the problem from thecustomer?
Question 38
38.
A relaxed customer is more likely to be able to provide the _________ that you need to determine the source of the problem and then fix it?
Question 39
39.
When you are talking with a customer over the phone, that customer can hear your ________ and _________?
Question 40
40.
Customers can also sense whether you are smiling when you are speaking withthem on the phone?
Question 41
41.
A knowledgeable technician who uses good communication skills will not be in demand in the jobs market?
Question 42
42.
The IT technician has access to several _________ and ____________ tools?
Question 43
43.
It is harmful to gather information for the troubleshooting process?
Question 44
44.
An IT technician must know, relate and understand the client?
Question 45
45.
Which one applies when an IT technician: Call the customer by his or her name?
Question 46
46.
An IT technician should never ask if there is any name that they prefer you use?
Question 47
47.
Which one applies when an IT technician: Create a one-to-one connection between you and your customer?
Question 48
48.
If you hear a dog barking in the background of the call and you have a dog, then briefly ask the client to go into another area where you can not hear the dog?
Question 49
49.
Determining your customer's level of knowledge about the computer to help you best communicate with them is an example of which of the follow?
Question 50
50.
Allowing the customer to tell the whole story. During the time that the customer is explaining the problem is considered annoying?
Question 51
51.
Listening carefully when your customers speak and let them finish their thoughts is which of the following?
Question 52
52.
Follow-up questions should not be targeted, closed-ended questions based on the information that you have already gathered.
Question 53
53.
After listening to the customer explain a small part of the problem, summarize what the customer has said is considered which of the following?
Question 54
54.
The customer should be able to answer a closed-ended question with a simple “yes” or “no” or with a factual response?
Question 55
55.
Communication Skills, Troubleshooting and the IT Professional establishes good communication skills when a technician does which of the following?