IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: IT EssentialsWhat is a characteristic of the open source license of an application software?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8Which change management process component is concerned with the cost and resources necessary for implementation?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8A customer is angry and calls to complain that the service scheduled on the computer took longer than expected. The technician reviews the work order and notices that the service was performed by a new employee. How should the technician respond?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8What is the definition of cyber law?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8A support desk trainer is teaching a new support desk technician some basic rules about starting a conversation with a customer. Which statement describes the rules the trainer should be teaching?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8A worker in the records department of a hospital in the United States accidentally sends a patient’s medical record to a printer in another department. When the worker arrives at the printer, the patient record printout is missing. Which two types of compliance standards best match the breach of confidentiality? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8What should a level two technician do immediately after receiving an escalated work order from a level one technician?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8A programmer used an operator to compare values within a program and the resulting logical data type was “false”. Which test condition would have provided the result of “false”?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8What is a reason to escalate a problem from a level one technician to a level two technician?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8Which two security precautions will help protect a workplace against social engineering? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8A user complains about not being able to modify a shared remote file. The technician investigates the issue and notices that both NTFS and share permissions have been assigned to the shared folder and file. What is the effective permission when this security technique has been applied?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8The corporate security policy states that all remote connections use only secure tunnels for data communications. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8A user has reported SMART messages displayed on the computer screen several times over the past few weeks. Which computer part should the technician check first?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8What is the most effective way of securing wireless traffic?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8What are two benefits of using an ext4 partition instead of ext3? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, CCNA CyberOps, IT Essentials 8