Chapter 2 Flashcards

1
Q

What do wireless controllers manage?

A

Wireless controllers manage wireless access points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the ideal temperature range for computer maintenance?

A

Maintain a temperature between 70 and 74 degrees Fahrenheit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What humidity levels should be maintained to avoid ESD?

A

Keep humidity levels between 40% and 70%.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of HVAC system is recommended for air quality?

A

Utilize positive pressure HVAC systems with filters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Electromagnetic Interference (EMI)?

A

EMI affects wired network signals and is caused by motors, machinery, and fluorescent lights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can EMI be mitigated?

A

Shielded twisted pair or fiber optic cables can mitigate EMI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Radio Frequency Interference (RFI)?

A

RFI affects wireless networks, particularly those operating on the 2.4 GHz frequency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can RFI be reduced?

A

Using the 5.75 GHz range or changing wireless channels can reduce RFI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What should be kept away from hard drives?

A

Keep magnets away from hard drives to prevent data erasure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are common sources of magnetic fields?

A

Speakers, motors, and generators contain magnets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Are solid-state drives affected by magnetic fields?

A

Solid-state drives like RAM and flash drives are not susceptible to magnetic fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are essential supplies for computer cleaning?

A

Lint-free cloth, compressed air, anti-static vacuum, and isopropyl alcohol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a benefit of regular cleaning?

A

Regular cleaning helps identify worn or damaged components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What safety precautions should be taken before cleaning?

A

Power down, unplug components, and let them cool for at least 30 minutes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How should liquid cleaners be applied?

A

Use liquid cleaners sparingly and apply them to a cloth, never directly on components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What can be used to clean electrical connectors?

A

Use a small amount of denatured alcohol on a cotton swab.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What should be used for cleaning LCD screens?

A

Use a lint-free dry cloth or isopropyl alcohol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is recommended for keyboard cleaning?

A

Use a vacuum or compressed air for general cleaning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How should printers be cleaned?

A

Use a damp or dry cloth for general cleaning and utilize the printer’s cleaning function for inkjet printheads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What should be done with new components after shipping?

A

Allow new components to sit for at least six hours after shipping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why is data backup important?

A

Implement regular backups to safeguard against data loss from hard drive failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What should be used to protect equipment when not in use?

A

Use covers to shield equipment from dust and spills.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How can cable management be improved?

A

Organize cables using ties to prevent kinks and damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the first step in the troubleshooting process?

A

Identify the Problem: Gather information from various sources to identify the root cause of the issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What should be done after identifying the problem?

A

Establish a Theory: Formulate a theory based on research and experience to explain the problem’s cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How do you confirm the root cause of an issue?

A

Test the Theory: Test the theory without making configuration changes to confirm the root cause.

27
Q

What is the next step after testing the theory?

A

Implement the Solution: Implement the solution while ensuring a rollback plan is in place.

28
Q

What should be done to ensure the problem is resolved?

A

Verify Functionality: Test the system to ensure the problem is resolved.

29
Q

What should be applied to prevent future occurrences?

A

Implement Preventive Measures: If possible, apply the fix to similar devices or systems to prevent future occurrences.

30
Q

Why is documenting troubleshooting steps important?

A

Document troubleshooting steps, changes, and findings for future reference.

31
Q

What is crucial for accurately reproducing a problem?

A

Accurately reproducing the problem is crucial for effective troubleshooting.

32
Q

Where can you find troubleshooting resources?

A

Consult manufacturer websites for troubleshooting resources.

33
Q

What tools should be utilized for diagnostics?

A

Utilize manufacturer-provided diagnostic software tools.

34
Q

What should be kept to test for faulty hardware?

A

Keep spare components to swap and test for faulty hardware.

35
Q

What should be checked for intermittent problems?

A

Check for environmental factors, such as cable kinks and overheating.

36
Q

How can hardware errors be isolated?

A

Simplify the system by removing non-essential components to isolate hardware errors.

37
Q

What should be considered as potential causes of issues?

A

Consider software errors as potential causes.

38
Q

What should be adhered to during issue management?

A

Adhere to corporate policies and consider the impact of changes.

39
Q

How can issues be detected?

A

Issues can be detected through help desk channels, in-person requests, and monitoring software.

40
Q

How should issues be organized?

A

Organize issues by department, severity, and escalation.

41
Q

What should be utilized to track problem status?

A

Utilize the ticketing system to track problem status and resolution.

42
Q

What does asset management include?

A

Asset management includes valuable resources like information, inventory control, and procurement.

43
Q

What is the procurement life cycle?

A

Follow a structured procurement process: determine needs, identify suppliers, negotiate contracts, finalize orders, process invoices.

44
Q

What should be recorded in inventory management?

A

Record asset details like make, model, serial number, warranty, location, and licensing information.

45
Q

What information should be included in deployment?

A

Deployment should include make, model, serial number, warranty, location, and licensing information.

46
Q

What is the purpose of testing and configuration?

A

Test the asset in a sandbox environment before deploying it to production.

47
Q

What are regular maintenance activities?

A

Regular maintenance tasks include updates, preventative measures, repairs, and upgrades.

48
Q

Why is it important to keep inventory updates?

A

To keep the inventory management database up-to-date.

49
Q

What should be done with sensitive information before disposal?

A

Ensure sensitive information is erased from assets before disposal.

50
Q

What is the importance of understanding policies and procedures?

A

To ensure compliance and smooth operations.

51
Q

What do Standard Operating Procedures (SOPs) outline?

A

SOPs outline purpose, steps, equipment, and troubleshooting for complex business activities.

52
Q

Why is compliance awareness important?

A

To be aware of industry-specific regulations and how they impact IT systems.

53
Q

What can splash screens display?

A

Splash screens can display regulatory and compliance policies.

54
Q

What should you familiarize yourself with regarding password policy?

A

Password requirements, account lockout policies, password change frequency, and strong password guidelines.

55
Q

What does the BYOD policy entail?

A

Understand usage guidelines, device types, monitoring practices, and security requirements.

56
Q

What should you know about the backup policy?

A

Backup types, access restrictions, and logging procedures.

57
Q

What does the physical security policy cover?

A

Restricted areas, access control methods, and monitoring practices.

58
Q

What is the Acceptable Use Policy (AUP)?

A

It outlines employee rights and responsibilities regarding company resources like computers, internet access, and email.

59
Q

What is the purpose of the User Education and Awareness Policy?

A

To learn about security practices, suspicious activities, and participate in mandatory training.

60
Q

What should you understand about the network diagram?

A

The network layout, including device locations, IP addresses, and connections.

61
Q

What should you be familiar with regarding the floor plan?

A

The physical layout of electrical, plumbing, HVAC, and network components.

62
Q

How can the knowledge base be utilized?

A

To troubleshoot issues, find answers to frequently asked questions, and access procedures for custom installations.

63
Q

What is onboarding?

A

Onboarding involves following procedures such as paperwork completion, access verification, equipment and software setup, account creation, and security training.

64
Q

What is offboarding?

A

Offboarding ensures all checklist items are completed, including collecting physical access items, disabling electronic access, and retrieving company assets.