IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: IT Essentials 8What category of technician uses remote access software to update a computer belonging to a customer?ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8Once a technician understands a customer complaint, it is common to ask closed-ended questions. Which question is a close-ended one?ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8A supervisor received a complaint that one of the technicians was rude and disrespectful. Which action by the technician most likely caused the customer to complain?ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8What approach should a technician take when receiving a call from a stressed customer?ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8A customer is upset and wants to speak to a specific technician to resolve a problem immediately. The requested technician is away from the office for the next hour. What is the best way to handle this call?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8Which situation would require that a support desk call be given the highest priority?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8What are two examples of displaying professional communication skills while talking to a customer? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8What is the correct way to conduct a telephone call to troubleshoot a computer problem?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8What is considered ethical behavior by a technician when communicating with a customer?ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8When configuring Windows security, which term is used to mean a rule assocated with an object such as a folder or printer?ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8A technician in a small business is configuring the local security policy for a computer. Which configuration setting would the technician use to require the user to change the password after 90 days?ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8A corporate employee has recently taken the mandated security awareness training and is wanting to use the correct security term. Which issue can occur when browsing the internet and is often initiated by the destination website?ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8A technician has recently changed jobs from supporting a small company to a large company in the security group. What are two types of passwords the larger company could use to secure a workstation? (Choose two.)ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8Which type of hard drive format is commonly performed at the factory where the drive is assembled?ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8As data is being stored on a local hard disk, which method would secure the data from unauthorized access?IT Administrator asked 3 years ago • CCNA Security, Introduction to Cybersecurity, IT Essentials, IT Essentials 8