Chapter 2 Flashcards
What do wireless controllers manage?
Wireless controllers manage wireless access points.
What is the ideal temperature range for computer maintenance?
Maintain a temperature between 70 and 74 degrees Fahrenheit.
What humidity levels should be maintained to avoid ESD?
Keep humidity levels between 40% and 70%.
What type of HVAC system is recommended for air quality?
Utilize positive pressure HVAC systems with filters.
What is Electromagnetic Interference (EMI)?
EMI affects wired network signals and is caused by motors, machinery, and fluorescent lights.
How can EMI be mitigated?
Shielded twisted pair or fiber optic cables can mitigate EMI.
What is Radio Frequency Interference (RFI)?
RFI affects wireless networks, particularly those operating on the 2.4 GHz frequency.
How can RFI be reduced?
Using the 5.75 GHz range or changing wireless channels can reduce RFI.
What should be kept away from hard drives?
Keep magnets away from hard drives to prevent data erasure.
What are common sources of magnetic fields?
Speakers, motors, and generators contain magnets.
Are solid-state drives affected by magnetic fields?
Solid-state drives like RAM and flash drives are not susceptible to magnetic fields.
What are essential supplies for computer cleaning?
Lint-free cloth, compressed air, anti-static vacuum, and isopropyl alcohol.
What is a benefit of regular cleaning?
Regular cleaning helps identify worn or damaged components.
What safety precautions should be taken before cleaning?
Power down, unplug components, and let them cool for at least 30 minutes.
How should liquid cleaners be applied?
Use liquid cleaners sparingly and apply them to a cloth, never directly on components.
What can be used to clean electrical connectors?
Use a small amount of denatured alcohol on a cotton swab.
What should be used for cleaning LCD screens?
Use a lint-free dry cloth or isopropyl alcohol.
What is recommended for keyboard cleaning?
Use a vacuum or compressed air for general cleaning.
How should printers be cleaned?
Use a damp or dry cloth for general cleaning and utilize the printer’s cleaning function for inkjet printheads.
What should be done with new components after shipping?
Allow new components to sit for at least six hours after shipping.
Why is data backup important?
Implement regular backups to safeguard against data loss from hard drive failure.
What should be used to protect equipment when not in use?
Use covers to shield equipment from dust and spills.
How can cable management be improved?
Organize cables using ties to prevent kinks and damage.
What is the first step in the troubleshooting process?
Identify the Problem: Gather information from various sources to identify the root cause of the issue.
What should be done after identifying the problem?
Establish a Theory: Formulate a theory based on research and experience to explain the problem’s cause.
How do you confirm the root cause of an issue?
Test the Theory: Test the theory without making configuration changes to confirm the root cause.
What is the next step after testing the theory?
Implement the Solution: Implement the solution while ensuring a rollback plan is in place.
What should be done to ensure the problem is resolved?
Verify Functionality: Test the system to ensure the problem is resolved.
What should be applied to prevent future occurrences?
Implement Preventive Measures: If possible, apply the fix to similar devices or systems to prevent future occurrences.
Why is documenting troubleshooting steps important?
Document troubleshooting steps, changes, and findings for future reference.
What is crucial for accurately reproducing a problem?
Accurately reproducing the problem is crucial for effective troubleshooting.
Where can you find troubleshooting resources?
Consult manufacturer websites for troubleshooting resources.
What tools should be utilized for diagnostics?
Utilize manufacturer-provided diagnostic software tools.
What should be kept to test for faulty hardware?
Keep spare components to swap and test for faulty hardware.
What should be checked for intermittent problems?
Check for environmental factors, such as cable kinks and overheating.
How can hardware errors be isolated?
Simplify the system by removing non-essential components to isolate hardware errors.
What should be considered as potential causes of issues?
Consider software errors as potential causes.
What should be adhered to during issue management?
Adhere to corporate policies and consider the impact of changes.
How can issues be detected?
Issues can be detected through help desk channels, in-person requests, and monitoring software.
How should issues be organized?
Organize issues by department, severity, and escalation.
What should be utilized to track problem status?
Utilize the ticketing system to track problem status and resolution.
What does asset management include?
Asset management includes valuable resources like information, inventory control, and procurement.
What is the procurement life cycle?
Follow a structured procurement process: determine needs, identify suppliers, negotiate contracts, finalize orders, process invoices.
What should be recorded in inventory management?
Record asset details like make, model, serial number, warranty, location, and licensing information.
What information should be included in deployment?
Deployment should include make, model, serial number, warranty, location, and licensing information.
What is the purpose of testing and configuration?
Test the asset in a sandbox environment before deploying it to production.
What are regular maintenance activities?
Regular maintenance tasks include updates, preventative measures, repairs, and upgrades.
Why is it important to keep inventory updates?
To keep the inventory management database up-to-date.
What should be done with sensitive information before disposal?
Ensure sensitive information is erased from assets before disposal.
What is the importance of understanding policies and procedures?
To ensure compliance and smooth operations.
What do Standard Operating Procedures (SOPs) outline?
SOPs outline purpose, steps, equipment, and troubleshooting for complex business activities.
Why is compliance awareness important?
To be aware of industry-specific regulations and how they impact IT systems.
What can splash screens display?
Splash screens can display regulatory and compliance policies.
What should you familiarize yourself with regarding password policy?
Password requirements, account lockout policies, password change frequency, and strong password guidelines.
What does the BYOD policy entail?
Understand usage guidelines, device types, monitoring practices, and security requirements.
What should you know about the backup policy?
Backup types, access restrictions, and logging procedures.
What does the physical security policy cover?
Restricted areas, access control methods, and monitoring practices.
What is the Acceptable Use Policy (AUP)?
It outlines employee rights and responsibilities regarding company resources like computers, internet access, and email.
What is the purpose of the User Education and Awareness Policy?
To learn about security practices, suspicious activities, and participate in mandatory training.
What should you understand about the network diagram?
The network layout, including device locations, IP addresses, and connections.
What should you be familiar with regarding the floor plan?
The physical layout of electrical, plumbing, HVAC, and network components.
How can the knowledge base be utilized?
To troubleshoot issues, find answers to frequently asked questions, and access procedures for custom installations.
What is onboarding?
Onboarding involves following procedures such as paperwork completion, access verification, equipment and software setup, account creation, and security training.
What is offboarding?
Offboarding ensures all checklist items are completed, including collecting physical access items, disabling electronic access, and retrieving company assets.