A+ 902 Test 20 Flashcards

1
Q

Which of the following tools are used to provide protection against ESD?

A

ntistatic bag
Ground mat
Antistatic wrist strap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Examples of devices/device components regulated under special disposal procedures due to environmental/safety hazards include:

A

Batteries
CRTs
Toner cartridges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following devices may pose a risk to electrical safety due to accumulated high voltage?

A

CRTs
Power supplies
Inverters
Laser printers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A document describing procedures for safe handling, use, storage and disposal of potentially hazardous materials is called:

A

MSDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the terms listed below refers to an environmental control system?

A

HVAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The term “Brownout” refers to what kind of situation?

A

Temporary drop in voltage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the term “Blackout” refer to?

A

Power outage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A device designed to provide emergency power during an unexpected main power source outage is called:

A

UPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following solutions add(s) redundancy in areas identified as single points of failure?

A

RAID
Uninterruptible Power Supply (UPS)
Backup generator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A device designed to protect electronic devices from large voltage fluctuations is known as:

A

Surge suppressor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following tools would be used to clean the inside of a laser printer?

A

Can of compressed air

Toner vacuum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In cases where users are found in violation of policies related to prohibited content or activity, the elements of first response should include:

A

Reporting through proper channels
Problem identification
Data/device preservation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In forensic procedures, a chronological record outlining persons in possession of an evidence is referred to as:

A

Chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A type of control access technology providing protection against copyright infringements is called:

A

DRM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An agreement granting a user the right to use software application in a manner determined by the software vendor is known as:

A

EULA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

hich of the following acronyms refers to any type of information pertaining to an individual that can be used to uniquely identify that person?

A

PII

17
Q

Examples of proper communication and professional skills while dealing with difficult customer include:

A

Clarifying customer statements by asking open ended questions to narrow the scope of the problem
Restating the issue to verify understanding

18
Q

Which of the following is an example of good communication skills when dealing with a customer?

A

Listening to the customer and avoiding interruptions until he or she has finished describing the problem

19
Q

Which of the answers listed below refers to an example of appropriate handling of customer’s confidential data in a situation where troubleshooting requires user’s password?

A

Ask user to type in the password themselves

20
Q

Which of the following actions should be the first step in the troubleshooting process?

A

Identifying the problem

21
Q

Establishing a theory of probable cause of the problem is a troubleshooting step that apart from conducting research based on symptoms may also involve asking for assistance of a more experienced tech.

A

False

22
Q

Once the theory of probable cause of the problem has been established, the next troubleshooting step should involve:

A

Testing the theory to determine the problem cause

23
Q

Once a plan of action to resolve a problem has been established, the next step in the troubleshooting methodology process is to:

A

Implement the solution

24
Q

According to the troubleshooting theory, verification of full system functionality and implementation of applicable preventative measures should be performed:

A

After implementing the solution

25
Q

The very last step of the troubleshooting process involves documenting findings, actions and outcomes. This step comes after verification of full system functionality and implementation of applicable preventive measures.

A

True