IT Essentials (Version 8.0) – IT Essentials 8.0 Chapter 14 Exam Answers (14.6 Module Exam)
How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question to find that question/answer. If the question is not here, find it in Questions Bank.
NOTE: If you have the new question on this test, please comment Question and Multiple-Choice list in form below this article. We will update answers for you in the shortest time. Thank you! We truly value your contribution to the website.
1. What is a reason to escalate a problem from a level one technician to a level two technician?
- when a peripheral device needs to be replaced
- when the screen resolution of a customer PC needs to be adjusted
- when drivers, applications, or operating systems need to be installed
- when the equipment needs to be rebooted
Explanation: A technician should always follow company policies for problem escalation, but in general a problem should be escalated to a level two technician anytime it involves an advanced procedure that could cause serious damage to user equipment, data loss, or cause a widespread outage. Also, if the technician does not have the necessary skills or tools to troubleshoot an issue effectively, the issue should be escalated to a level two technician.
2. A programmer used an operator to compare values within a program and the resulting logical data type was “false”. Which test condition would have provided the result of “false”?
- 4 >= 1
- 8 != 8
- 3 == 3
- 6 <= 6
Explanation: == represents equal
!= represents not equal
< represents less than > represents greater than
<=r epresents less than or equal to >= represents greater than or equal to
Because 8 is equal to 8, and the != operator is used, the resulting output is “false”.
3. What should a level two technician do immediately after receiving an escalated work order from a level one technician?
- Send the work order to a level three technician and ask for support.
- Call the level one technician and ask questions about the problem.
- Document suggestions to solve the problem in the work order and return it to the level one technician.
- Call the customer back to ask any additional questions and resolve the problem.
Explanation: When a problem cannot be resolved within a predetermined amount of time, the level one technician prepares an escalated work order. The level two technician receives the escalated work order with the description of the problem. The level two technician then calls the customer back to ask any additional questions and resolve the problem.
4. A worker in the records department of a hospital in the United States accidentally sends a patient’s medical record to a printer in another department. When the worker arrives at the printer, the patient record printout is missing. Which two types of compliance standards best match the breach of confidentiality? (Choose two.)
- GDPR
- PHI
- PII
- ePHI
- DRM
- PCI
Explanation: Both protected Health Information (PHI) and Electronic Protected Health Information (ePHI) includes patient name, addresses, visiting dates and more. The Health Insurance Portability and Accountability Act (HIPAA) regulates and provides severe penalties for breaches of PHI and ePHI.
5. A support desk trainer is teaching a new support desk technician some basic rules about starting a conversation with a customer. Which statement describes the rules the trainer should be teaching?
- Learn the name of the customer and create a connection with the customer. Next ask questions that assess the knowledge level of the customer.
- Start by asking close-ended questions about what the customer understands of the problem and then direct the customer through the correction process.
- Ask the customer what the problem is and then introduce yourself.
- Assess what the customer knows of the support desk process and then use close-ended questions to guide the customer through the correction process.
Explanation: The three rules to remember at the beginning of a conversation with a customer are these:
Know your customer
Create a one to one connection with your customer.
Understand the knowledge level of your customer
6. What is the definition of cyber law?
- the process of collecting and analyzing data from computer systems, networks, wireless communications, and storage devices
- a contract that defines expectations between an organization and IT service vendors for an agreed upon level of support
- a single law defining criminal acts that are committed online
- the collection of international, country, and local laws that affect computer security professionals
Explanation: Cyber law describes the collection of international, regional, country, and state laws that affect computer security professionals.
7. A customer is angry and calls to complain that the service scheduled on the computer took longer than expected. The technician reviews the work order and notices that the service was performed by a new employee. How should the technician respond?
- Put the customer on hold until a supervisor is available.
- Verify that the computer is working properly now.
- Explain that the repair technician sent to perform the service is inexperienced.
- Listen to the complaint and then apologize for any inconvenience caused by the lengthy service on the computer.
Explanation: When dealing with an angry customer, listen and without interrupting let the customer explain the problem. Show sympathy. Apologize for the problem and its inconvenience.
8. Which change management process component is concerned with the cost and resources necessary for implementation?
- identification
- approval
- assessment
- implementation
Explanation: There are several change management process components that help changes, installations, and upgrades go more easily. The assessment component identifies the business processes that are affected and the costs and resources required.
9. What is a characteristic of the open source license of an application software?
- It allows users to modify and share the source code.
- It requires registration instead of purchasing.
- It does not require purchase in order to use the software.
- It requires acknowledged completion of a professional training course prior to use.
- It cannot be used for campus-wide deployment.
Explanation: An open source license is a copyright license for software that allows developers to modify and share the source code that runs the software. Open source software could be free to use or require purchase. In either case, users have access to the source code. Open source software could be used as personal software or deployed enterprise wide. User registration is an encouraged optional feature.
10. Which is true regarding the treatment of customer property?
- Data left on a customer’s PC is not property because it is visible to others.
- Customer property is limited to hardware.
- A customer’s phone list is customer property and must be kept private.
- A technician does not have to care about copies of customer files because it is not the original.
Explanation: All customer property is important, including files, phone lists, hardware and other data, and should be treated with respect. Any data should be considered as private and confidential.
11. Which statement best describes a call center?
- It is a help desk used by customers to make an appointment to report their computer problems.
- It is a store-front environment where the customers go with their computers to have them fixed.
- It is a place that exists within a company and provides computer support to both employees and customers of the company.
- It is a busy, fast-paced work environment where agents contact customers to arrange preventive maintenance appointments.
Explanation: A call center is a place that customers call to report problems with software or hardware. It may be an independent business that sells computer support as a service or it may exist within a company and offer service to both employees of the company and outside customers that use company products.
12. When performing computer forensics, what can be prevented with a properly and carefully documented chain of custody?
- cyber crime
- evidence tampering
- identity theft
- copying of copyrighted materials
Explanation: A chain of custody created with accurate documentation can prevent evidence tampering so that the integrity of the evidence can be assured.
13. What is a common responsibility of a level one call center technician?
- remotely connecting to customer devices and implementing driver and software updates
- entering a concise description of a customer problem into a ticketing system
- receiving escalated work orders from a lower level technician
- calling back customers and asking additional questions to solve the problem
Explanation: The primary responsibility of a level one technician is to gather pertinent information from a customer and to enter the information into a work order or ticket system.
14. Which statement is characteristic of most personal software licenses?
- A user is allowed to share the software with friends.
- A company is allowed to use the software campus wide.
- A user is allowed to install the software on only one computer.
- Developers are allowed to modify and share the source code that runs the software.
Explanation: Most personal software licenses allow a user to run the software on only one PC. Some personal software licenses allow a user to copy the software onto multiple PCs. These licenses usually specify that the copies cannot be run at the same time. Some personal software licenses are for commercial products that require purchase. There are personal software licenses for open source software that are free to use. Personal software licenses are intended for personal use of the product. Software to be deployed campus wide needs site licenses or enterprise licenses.
15. A technician is attempting to securely configure a Linux web server on the public-facing side of the firewall. What port type and number are most likely required to be open on the firewall to allow this traffic through?
- UDP port 22
- TCP port 22
- UDP port 23
- TCP port 3389
- TCP port 23
- UDP port 3389
Explanation: Secure Shell (SSH) is a secure remote service that encrypts the entire session. The port number for SSH is TCP port 22.
16. Which type of documentation is concerned with specifying what data must be collected and how long it must be retained in regards to an organization?
- operations
- policies
- user documentation
- projects
Explanation: There are four broad categories of IT documentation: policies, operations, projects, and user documentation. Policy documentation is concerned with regulatory compliance with local, state, and federal regulations.
17. Which task would require that a problem be escalated to a level two technician?
- checking loose external cables
- cleaning a mouse
- changing CMOS settings
- changing toner cartridges
Explanation: Straightforward tasks such as cleaning the mouse, changing printer toner, and checking cables can be managed by a level one technician. Typically, more complex tasks such as changing CMOS settings and running diagnostic software would be escalated to a level two technician.
18. Which are two examples of good customer service? (Choose two.)
- A technician speaks slowly and uses common industry jargon and terms with the customer.
- A technician continually reminds the customer that an issue was due to customer neglect.
- A technician notifies a customer as soon as possible that there may be a delay.
- A technician follows up with a customer after services are completed.
- A technician repeatedly encourages a customer to agree to a product warranty.
Explanation: Good customer service means meeting or exceeding customer expectations. Customers expect service technicians to be on time and to communicate if they will be late. Customers also appreciate a follow up communication after service is rendered.
19. Which two programming languages require the program to be converted into executable code using a compiler? (Choose two.)
- Java
- Python
- VBScript
- C#
- PowerShell
Explanation: Compiled languages like C, C++, C#, and Java need to be converted into executable code using a compiler.
20. A technician is troubleshooting a PC in a workplace environment and finds many pirated movies on the hard drive. What should the technician do?
- Make a copy of all the pirated content and send it to the law enforcement authorities.
- Remove the pirated content and document all work done.
- Report the findings through the proper channels.
- Advise the user that downloading pirated content is illegal and that the user should refrain from doing so.
Explanation: On discovering illegal activity on a PC, the technician should report it through the proper channels as per company policy.
21. What does a technician need in order to make changes to software installed on the computer of a customer?
- verification that the software is legal
- two witnesses
- the authorization of a more senior technician
- customer authorization
Explanation: To make any changes to a computer, a technician needs authorization from the customer. The presence of either another technician or other witnesses does not entitle the technician to either install or modify software, even if it is legal.
22. Why is a chain of custody important in a cyber crime case?
- It protects copyrighted materials.
- It ensures conviction
- It proves guilt.
- It authenticates evidence.
Explanation: Evidence must be authenticated before it can be admitted in court. A chain of custody helps to authenticate the evidence by preventing tampering.
23. What two actions should a call center technician avoid when dealing with an angry customer? (Choose two.)
- putting the customer on hold or transferring the call
- apologizing for any inconvenience caused to the customer
- sympathizing with the customer
- spending time explaining what caused the problem
- letting the customer explain the problem without interruption
Explanation: When dealing with an angry customer a technician can help the customer focus on the problem by:Letting the customer explain the problem without interruption
Sympathizing with the customer
Apologizing for inconvenience
The technician should avoid further angering the customer by:Putting the customer on hold
Explaining what caused the problem
24. What is the definition of a script file?
- A simple text file used to automate processes and tasks.
- A simple file with a single statement that loops repeatedly.
- A file that is compiled and translated into machine language before executing.
- A file that is the output of a conditional statement.
Explanation: A script file is a simple text file written in a form of scripting languages to automate processes and tasks on various operating systems. The commands can be entered on the command line one at a time. A script file, however, provides a more effective way to execute multiple commands.
25. What are two examples of personally identifiable information (PII)? (Choose two.)
- credit card number
- first name
- language preference
- street address
- IP address
Explanation: Personally identifiable information (PII) is any data that could potentially identify and track a specific individual. A credit card number and street address are the best examples of PII.
26. What is a typical task performed by a level one technician in a call center?
- solving the problem that might require opening up the computer case
- using remote access software to troubleshoot the customer computer
- picking up an escalated work order and calling the customer for further information
- gathering information when a customer calls for help
Explanation: The primary responsibility of a level one technician is to gather information from the customer. The level one technician needs to accurately enter all the information into the work order. When the problems are very simple to resolve, a level one technician can take care of these without escalating the work order. However, when a problem requires the expertise of a level two technician, the level one technician initiates an escalated work order so that a level two technician will be involved to solve the problem.
27. Which two rules pertain to the general daily activities of employees in a call center environment? (Choose two.)
- If a technician takes a call from a customer the technician does not like, the technician should pass the call to another technician.
- If a customer complains about another technician, the technician who is taking the call should agree with opinion of the customer.
- The technician should adjust the work chair to a height that is high enough so that wrists angle downwards toward the keyboard.
- The technician should be sure to treat all customers equally.
- The technician should contact the customer if the technician is going to be late for a follow-up appointment.
Explanation: There are rules that call centers generally use to cover the daily activities of their employees. These rules are designed to ensure that there is always adequate coverage for incoming calls, and that the customer is not unduly inconvenienced when working with the call center employees. A high rate of customer satisfaction is always a primary goal of any call center.
28. During computer forensics investigations, which type of data is lost when power is removed from the computer?
- data that is stored on solid state drives
- data that is stored on magnetic disk
- data that is stored to an external drive
- data that is stored in RAM
Explanation: Volatile data that is contained in cache, RAM, and CPU registers is lost when power is removed from the computer.
29. A system administrator needs to perform manual updates on a remote Linux workstation using a Windows 10 PC. Which remote access tool should the administrator use to securely access and configure the Linux device across the network?
- SSH client
- Telnet client
- Windows Remote Desktop client
- Windows Remote Assistance client
Explanation: The Windows administrator should use Secure Shell (SSH) TCP port 22. SSH allows the administrator to connect remotely and securely to the Linux workstation in order to safely authenticate and then perform updates on the workstation.
30. A technician receives a call from a customer who is too talkative. How should the technician handle the call?
- Talk over the customer and quickly gather the necessary information to be of help.
- Use open-ended questions and repeat all the information back to the customer to politely show that unnecessary information is being given.
- Allow the customer to speak without interruption and then try to use closed-ended questions to gather data.
- Politely step in and gain control of the call by asking the customer social questions.
Explanation: If a customer is too talkative, the technician should not interrupt the customer but attempt to regain control of the call by asking closed ended questions after customer is through speaking.