One of your technicians is on a service call and is dealing with a furious customer who has been shouting loudly. The technician tries but cannot calm down the customer. Which of the following statements best describes the next step the technician should take?
CompTIA A+ Core 2 Practice Test A

Quiz
•
Computers
•
University
•
Medium
Candice Kiser
Used 1K+ times
FREE Resource
80 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
He should let the customer continue to shout; sooner or later the customer will get tired and calm down
He should call the supervisor and complain
He should leave the customer site and document the incident
He should shout back at the customer in an attempt to regain control of the situation
Answer explanation
Explanation:
The technician should leave the customer site and document the incident. In rare cases, there is no way to calm down the customer, and you might have to leave the site if there is no other alternative.
Incorrect Answers: If the customer has been shouting for a while and the technician cannot calm down the customer, it’s pointless to stay and wait. You don’t want to call your supervisor and complain about the situation while you’re at the customer’s location; that would probably infuriate the customer further. Wait until you have left the customer’s premises. Never shout back at the customer; this is not a battle for power, and you should never take a customer’s anger personally. Be sure to document the incident in depth after leaving the customer’s location. Definitely let your supervisor know what has happened – without complaining.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which type of software helps protect against viruses that are attached to email?
Firewall software
Antivirus software
Edge
Hardware firewall
Answer explanation
Explanation:
Antivirus software (from vendors such as McAfee or Norton) updates automatically to protect you against the latest viruses, whether they are attached to emails or are lying in wait on removable media. You might also choose to use the built-in Microsoft Defender or Windows Security on newer versions of Windows.
Incorrect Answers: Firewalls protect against intrusion but not viruses. They could be hardware based, such as the ones found in most SOHO multifunction network devices, or software based, such as Windows Defender Firewall. Edge and Chrome (as well as other web browsers) can be configured to make your system more secure (especially when dealing with web-based emails), but that is not the best answer listed.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You create an answer file to aid in installing Windows. Which type of installation are you performing?
Drive image installation
USB installation
Multiboot installation
Unattended installation
Answer explanation
Explanation:
An unattended installation of Windows requires an answer file. This file is normally named unattend.xml. Unattended installations can be done locally or as part of a network installation, using Windows Deployment Services (WDS) in Windows Server.
Incorrect Answers: Drive image installations use third-party programs such as Ghost or work with a System Restore image created within Windows. Local installation from USB is possible if you copy the Windows .iso file to the USB flash drive (if the drive is big enough) and obtain the USB/DVD download tool from the Microsoft website. A multiboot installation means that more than one operating system is being installed to the same drive. One or both of these could possibly be unattended installations. Remember that with multiboot installations, each OS should inhabit its own primary partition.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You need to locate a mobile device that was stolen. Which technology can aid in this?
GPS
Screen orientation
Passcode lock
Gmail
Answer explanation
Explanation:
The Global Positioning System (GPS) technology (or location services) can be instrumental in locating lost or stolen mobile devices. Many devices have GPS technology installed; others rely on geotracking or Wi-Fi hotspot location techniques. (You are being watched!)
Incorrect Answers: Screen orientation is the direction of screen display – vertical or horizontal (or upside down) – which typically depends on how you hold the device. It can be calibrated on Android devices with the G-Sensor calibration tool. A passcode lock is a set of numbers that must be entered to open a mobile device or take it out of sleep mode. Gmail is Google’s web-based email service and is incorporated into the Android operating system.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
When a person takes control of a session between a server and a client, it is known as which type of attack?
DDoS
Brute force
Session hijacking
Malicious software
Answer explanation
Explanation:
Session hijacking occurs when an unwanted mediator takes control of the session between a client and a server (for example, an FTP or HTTP session). An example of this would be an on-path attack – also known as a man-in-the-middle (MITM) attack.
Incorrect Answers: DDoS stands for distributed denial-of-service attack, an attack perpetuated by hundreds or thousands of computers in an effort to take down a single server; the computers involved in this type of attack, individually known as zombies, are often unknowingly part of a botnet. A brute-force attack is an attempt to crack an encryption code or password. Malicious software is any compromising code or software that can damage a computer’s files; examples include viruses, spyware, worms, rootkits, ransomware, and Trojans.
6.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which of the following settings must be established when you want to make a secure wireless connection? (Choose Two.)
The brand of access point
The wireless standard used
The encryption standard used
The SSID of the access point
Answer explanation
Explanation:
To make a secure connection, you need to know the service set identifier (SSID) of the AP and the encryption being used (for example, WPA2 or WPA3). The SSID takes care of the “connection” portion, and the encryption takes care of the “secure” portion. After all computers are connected, consider disabling the SSID for increased security.
Incorrect Answers: Knowing the wireless standard being used can help you verify whether your computer is compatible (802.11ax, ac, n, or g), but the brand of access point isn’t really helpful.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which log file contains information about Windows setup errors?
setupact.log
setuperr.log
unattend.xml
diskmgmt.msc
Answer explanation
Explanation:
setuperr.log contains information about setup errors during the installation of Windows. Start with this log file when troubleshooting. A file size of 0 bytes indicates no errors during installation.
Incorrect Answers: setupact.log contains the events that occurred during the installation. unattend.xml is the answer file used by Windows during unattended installations. diskmgmt.msc is a command that can be run from the Run prompt or the command line to open the Disk Management utility.
Create a free account and access millions of resources
Similar Resources on Quizizz
75 questions
TLE3 Midterm Examination (CED-14-301A)

Quiz
•
University
85 questions
AUTOCAD TEST

Quiz
•
University
83 questions
220-1002 Super Test

Quiz
•
University
75 questions
OCR L3 Cam Tech Unit 1 Fundamentals of IT

Quiz
•
University
81 questions
Computer Organization and Architecture

Quiz
•
University
75 questions
Database Concepts Quiz

Quiz
•
University
80 questions
Computer grade10

Quiz
•
10th Grade - University
78 questions
Active Directory Quiz

Quiz
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade