Chapter 9 Operational Procedures Flashcards

1
Q

When a technician is called into a building to service a computer or a network of computers, one of the first tasks is to:

A

understand how the network is supposed to work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A topology diagram is essentially:

A

a map of a network that show how equipment is physically arranged in the building and logically connected as a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A physical topology diagram uses:

A

representational icons to depict types of equipment such as laptops, PCs, servers, wireless access points, switches and routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A physical topology diagram may also show:

A

how computers and printers are arranged and the physical cables that connect them together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A physical topology diagram also maps:

A

wireless access ports and wiring closets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A technician can use a physical topology diagram to:

A

find a device she has been called to service

see what other equipment, such as printers, security cameras, and switches, are in use and where to find them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A physical topology diagram may “zoom out” and give:

A

the general design of a building, including wiring closets on floors and the point-of-presence (PoP) for connectivity to the ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A logical topology diagram depicts:

A

a network’s design, including how computers are grouped together into local area networks (LANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A logical topology diagram may include a:

A

basic map of wiring closets and general areas of the building, but instead of computers, this diagram focuses on network IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A logical topology diagram is beneficial because:

A

troubleshooting Internet connectivity is a major part of the IT workday, and knowing which network devices should be on saves time in troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A whitepaper focuses on:

A

a complex technical topic and tries to make it understandable to the average reader.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Companies often publish whitepapers on:

A

new technologies or products they are presenting to the public in order to influence decision makers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Knowledge bases may also consist of:

A

links to commonly accessed support forums where fellow IT professionals go to seek and give technical support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Documenting problems, or incidents helps in understanding:

A

how an incident came about and how a solution was found-as well as who may have had a role in the solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Incident Documentation will be invaluable to:

A

technicians the next time an incident occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a necessary part of legal and safe electronics and technology work?

A

Compliance with local government regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Construction codes for electrical and ventilation design are:

A

subject to local rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An acceptable use policy (AUP) is designed to:

A

keep a network safe from outside intruders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Each organization should define what it considers:

A

acceptable use of its computing resources within its network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

For legal protection of the company, acceptable use rules need to be:

A

established and agreed to (usually with a signature) by users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Password policy is mostly managed by:

A

network administrators, who may require complex passwords that need to be changed regularly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

It usually falls to the IT department to:

A

receive and document equipment with durable asset tags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Asset tags are usually:

A

customized, with each one including the name of the organization along with a barcode and serial number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Most often asset tags are made of:

A

a metalized polyester that should last as long as the computer asset is expected to be in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

An asset tag allows:

A

the company to track who is responsible for the equipment and how often it has needed repair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Using a barcode scanner on an asset tag is the most convenient way to:

A

keep track of the equipment while it is in use in the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The IT department is then responsible to:

A

document the equipment at the end of its usefulness as it goes out of inventory and is sold, donated, or destroyed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Change management is:

A

the process of preparing for changes in a network, including planning, staffing, organizing, and getting feedback from impacted stakeholders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Knowing how a company performs its many tasks can help create:

A

a map of how a change should be implemented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Many parts of an organization use the IT infrastructure in different ways, and it is necessary to:

A

have a document that records how it is used. This means creating a record of who uses the network, what parts they use, and how they impact other users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

2 reasons that clarity in the purpose for a successful network change or mitigation is essential are:

A

knowing the purpose of the project will help limit the score of change and keep it from getting larger than necessary

users will be inconvenienced, so they will need to be brought into the process to identify issues and help make the change successful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Score refers to:

A

the extent of the impact of a change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Scope must be determined so:

A

that all users and managers do not suddenly lose the ability to work when a change is implemented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Scoping a change means:

A

creating a detailed plan itemizing things that will stay the same after the change (things needed to perform core functions), things that will go away (old equipment, outdated applications, and so on), and things that have a mixed outcome (meaning there will be some benefit, like efficiency, but some drawback, like layoffs of loyal employees)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Examples of risks that IT managers plan for when making a change include:

A

delays

lower-than expected quality

use of of more resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A change manager may group the several aspects of a change into:

A

high-, medium-, and low-risk categories and manage the team resources according to the potential impact on the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Even small changes to a network need to:

A

have a well-planned implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Change management puts:

A

planning at the forefront and engages IT people and uses from across the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

It is important that all users of a network be:

A

aware of changes that will come and understand, based on detailed analysis, how those changes will impact functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

The end user of the network will be:

A

the final arbiters of success or failure in the change migration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Managers might need to schedule:

A

training time, and there may be a learning curve that users will have to accept and endure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The change board is also known as:

A

a change advisory board (CAB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

The change board is a:

A

group gathered from areas of the organization that will be impacted by the planned changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

The task of the change board is to:

A

analyze request for change (RFC) and study the benefits and risks of implementing changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

The change managers works under:

A

the authority of the change board and gives approval for the work to be done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Members of the change board are usually:

A

leadership-level employees who understand the impact that requested changes will have on the work in their respective areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

The backout plan is a:

A

document that lets the change administrators restore the network to the service level that was present before the change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Having a backout plan is important to have if the change plan has unintended consequences because it tells:

A

all the planned steps and logs the configuration codes necessary to get back to normal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

When changes occur, it is important to:

A

record what was changed and how it was accomplished

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

There are several ways to back up images, including:

A

backup to the cloud

using a backup service

creating a network-attached storage (NAS) system for a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

There are three levels of data backup, they are:

A

System image

File-level back

Critical application backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Describe system image:

A

Making a copy of an entire disk, including the Windows image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Describe File-level backup:

A

Backing up or archiving files such as documents, reports, and pictures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Describe Critical application backup:

A

Applications needed to restore business after a disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A system image backup includes:

A

everything on the drive-including the OS (which is the system image)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

The system image backup can be used to:

A

restore a failed computer if there is a failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

File-level backups can be:

A

documents, media files like video or music, or pictures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Critical applications varies depending on the organization, but generally they are:

A

the first files that will be restored after a disaster to get things running again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Testing backups is important because:

A

the worst time to find out your scheduled backups were not working properly is when they are needed to recover data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Testing backups ensures that:

A

the needed data is available when a backup is necessary, and it allows IT staff to practice restoration so the skill is in place when it is most needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

The main electrical hazards to computers are:

A

surges

brownouts

blackouts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

To combat the main electrical hazards to computers, every:

A

good wiring closet and server room has a combination of surge suppressors and uninterruptable power supplies (UPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

An uninterruptable power supply (UPS) keeps:

A

the power to the units in a server room, wiring closer, or other environment clean and allows for time to run and shut down properly in case of power failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

A true uninterruptable power supply (UPS) is one in which:

A

connected devices are always powered by the battery, which uses an inverter to continually convert AC power into DC power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

A standby power supply (SPS) or line-interactive unit is:

A

a unit that passes AC power through the unit’s integrated surge suppressor until the AC power fails. At that point, the battery takes over

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Surge protectors protect:

A

devices from extreme changes in power flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Surge protectors are essentially:

A

power strips that are plugged into a grounded wall outlet;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Surge protectors are rated in:

A

joules, which is how the protection level is described. The more joules, the stronger the protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What devices are normally plugged into Surge protectors?

A

devices such as PCs or phones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

The easiest way to back up data on workstations is to:

A

use an external drive (hard drive or USB flash drive) with a redundant backup on the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Scheduled backups should be:

A

run at times when the system is idle, such as overnight and on weekends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

On macOS go to System Preferences to enable and configure Time Machine and follow these steps:

A
  1. Connect a suitable external disk to a macOS system
  2. Click Backup Disk
  3. In the new window that appears, check the Encrypt Backups box to protect the backup
  4. Enter a password, confirm it, and enter a password hint. Click Encrypt Disk
  5. Make sure Time Machine is turned on. After the selected disk is encrypted, the backup starts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Linux includes several utilities that can be used for backups. These include:

A

command line tar and rsync utilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Backing up files or images to the cloud can be

A

managed by a cloud backup service that syncs the drives on a schedule you choose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Common names in the increasingly crowded cloud provider arena are:

A

Amazon Drive

Dropbox

Google Drive

OneDrive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Describe Cloud; Describe Local Storage; Who has the advantage?

Media

A

Web; Tape, CD, USB, hard drives; None

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Describe Cloud; Describe Local Storage; Who has the advantage?

Cost

A

As-needed subscription; Hardware, utilities, external location costs, and administrative overhead; Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Describe Cloud; Describe Local Storage; Who has the advantage?

Accessibility

A

On-demand access to files; Must be physically stored and secured in separate location; Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Describe Cloud; Describe Local Storage; Who has the advantage?

Safety

A

Secure but requires Web access; Secure when properly handled; None

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Describe Cloud; Describe Local Storage; Who has the advantage?

Flexibility

A

Backup any computer or file, restores files on demand; Can only back up local computers, need physical access to restore files; Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

There are three main types of data backup. They are:

A

Full

Incremental

Differential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Describe Full backup:

A

A full backup backs up the entire contents of the computer or select drive to another local or network location. This is the longest backup and uses the most storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Describe Incremental backup:

A

These backups copy only data that has changed since the last backup.

84
Q

Describe Differential backup:

A

These backups record changed data since the last full backup

85
Q

Most personal accounts from vendors can be recovered in one of several ways. The ways are:

A

Submitting an account email address on the login page and having a password recovery link sent via email

Having a tech support agent reset an account with a temporary password that must be reset upon login

Answering secret questions with answers provided during account setup

86
Q

Computer safety involves:

A

keeping computers safe from failure and keeping technicians safe while working in a dangerous environment.

87
Q

The concepts in the Computer safety section are:

A

Preventing electrostatic discharge

Working with electricity safely

Handling toxic waste

Protecting personal and physical safety

88
Q

Construction codes require:

A

that every building with electrical service must be grounded

89
Q

Grounding an electrical system means:

A

making a direct connection from the building’s electrical service to the earth so that dangerous voltage from line surges and lightning strikes will find its way into the earth instead of injuring people, damaging equipment, or causing a fire

90
Q

Every grounded outlet in a building has:

A

a direct connection to a metal grounding electrode that goes several feet into the earth

91
Q

Grounded outlets have:

A

three prongs in almost all world areas

92
Q

When should you use a grounded to ungrounded adapter?

A

When a grounded outlet is not available

93
Q

A grounded to ungrounded adapter can be used for:

A

temporary setups if the loop on the adapter can be connected to a working ground

94
Q

In the US, what electrical outlet has been required by code since 1962?

A

grounded 120V AC electrical outlets

95
Q

Electrostatic discharge (ESD) is:

A

the silent enemy of computer equipment

96
Q

Electrostatic discharge (ESD) may be:

A

too low for humans to detect but still strong enough to damage electronic components

97
Q

Equipment can be damaged by:

A

Electrostatic discharge (ESD) of 700V or higher

98
Q

A humidity decrease:

A

the voltage released during Electrostatic discharge (ESD) climbs

99
Q

Without Electrostatic discharge (ESD) protection:

A

static electricity will seek to discharge to anything else that has a different electric potential-especially metallic items like circuit boards

100
Q

Casually picking up an expensive video card can:

A

possibly damage it and cause a complete failure or could cause intermittent issues that would be difficult to troubleshoot

101
Q

There are four keys to protection from Electrostatic discharge (ESD):

A

Antistatic bags

ESD straps

ESD mats

Self-grounding

102
Q

When removing, a component from a computer, immediately:

A

place it in an antistatic bag and put it off to the side

103
Q

Removed parts should never be:

A

lying around outside an antistatic bag

104
Q

Normal bubble wrap bags do not:

A

constitute antistatic protection, so make sure to use proper antistatic bags

105
Q

After an item is placed in an antistatic bag:

A

place it in a protective box to avoid physical impact damge

106
Q

An Electrostatic discharge (ESD) strap is designed to:

A

equalize the electric potential of the user and the device the strap is clipped to, such as the interior of a computer

107
Q

By equalizing the electric potential, Electrostatic discharge (ESD) is prevented because the:

A

ESD is the movement of electricity between two objects with different electric potential

108
Q

An Electrostatic discharge (ESD) strap has two pieces:

A

An elastic or hook-and-loop strap with a built-in metal snap backed by a metal plate

A coiled flexible cable with a matching snap at one end and an alligator clip at the other end. The snap contains a 1 megohm resistor, which can help prevent injury in case of electrical discharge

109
Q

To properly use an ESD strap, follow these steps:

A
  1. Place the elastic or hook-and-loop strap around one wrist with the flat metal plate against the skin
  2. Adjust the strap until the metal plate stays in place as you move your wrist
  3. Snap the cable to the strap around your write
  4. Open the alligator cable and clamp it to unpainted metal on the object you are servicing
110
Q

The strap around your wrist with the metal place, snap, and cable equalizes:

A

electrical potential between you and the object you are servicing to prevent ESD

111
Q

An Electrostatic discharge (ESD) mat can be connected to a device being repaired using one of the following methods:

A

A cable with an alligator clip

A cable with a loop designed to be held in place by a case screw but with the cable snapped to the mat rather than to your wrist

112
Q

Self-grounding involves:

A

touching a nearby metal component before touching a device being serviced. Before opening a computer, you can self-ground by touching an unpainted portion of a chair before picking a component up or opening the device

113
Q

Before opening a computer, you can self-ground by:

A

touching an unpainted portion of the case with both hands before installing or uninstalling a component

114
Q

You should self-ground:

A

every time before touching a component if no other antistatic options are available

115
Q

When working with electronics, consider these precautions:

A

When handling components or cards, hold them by the edge or bracket

When handling components, stay stationary

Remove jewelry and wear protective clothing

If possible, work in a non-carpeted area

Avoid using AC-powered tools near a computer

116
Q

There are five types of computer-related toxic waste that the exam addresses for safe handling:

A

Batteries

Toner

CRT displays

Cell phones

Tablets

117
Q

What are the types of batteries for cell phones, computers, and other electronics

A

Nickel-cadmium (Ni-Cad)

Nickel-metal hydride (NiMH)

Lithium-ion (Li-Ion)

lead-acid cells

118
Q

There are several ways to recycle batteries safely to avoid environmental threats:

A

For small numbers of rechargeable batteries or devices that contain rechargeable batteries, use a recycling drop-off station

For large numbers of rechargeable batteries or UPS devices with batteries, contact an electronics recycler in your area

Some batteries can be returned directly to the manufacturer for recycling

During storage and transport, make sure battery contacts are prevented from touching each other

119
Q

How can users earn money or credits toward additional purchases?

A

By recycling toner bottles and cartridges products at local office-supply stores or toner recycling shops

120
Q

After removing the old toner cartridge, use:

A

a specially designed toner vacuum to remove loose toner from inside the printer before inserting the new cartridge

121
Q

Cathode ray tube (CRT) displays contain:

A

heavy metals, including solder on older models

122
Q

Cathode ray tube (CRT) can retain:

A

potentially dangerous electric charges long after it has been shut down

123
Q

Before repairing a PC, always be sure to do what?

A

disconnect power

124
Q

Remove jewelry of all kinds before:

A

working on a computer

125
Q

The proper type of fire extinguisher for an electrical fire is:

A

a Class C extinguisher

126
Q

Server rooms and data centers often are protected by:

A

a larger special hazard protection system that uses the FM-200 clean agent system

127
Q

the FM-200 clean agent system won’t:

A

cause damage to servers and other expensive equipment and is safe for humans

128
Q

If you see an electrical fire:

A

use the proper extinguisher to attempt to put it out

129
Q

If the fire involves a live electrical wire, it:

A

should be shut off at the source

130
Q

If you find an apparently unconscious person underneath a live wire, do not:

A

touch the person

131
Q

Routing power cables and data cables inside a PC is important for:

A

providing good airflow for cooling

132
Q

Any external USB cables should be:

A

routed in such a way that they won’t interfere with the normal activity of employees

133
Q

For good cable management, any network cables should be:

A

stationary and routed away from walking areas

134
Q

When running network cables for new computers, check:

A

local regulations first and see whether a licensed installer is required for compliance with local government regulations

135
Q

Wear safety goggles when:

A

performing computer repairs, cleaning, or upgrades to avoid eye injuries from dust, dirt, flyaway screws or bolts, solder, or other activities

136
Q

The U.S. standard for protective work eyewear is:

A

ANSI Z87.1-2010

137
Q

The U.S. National Institute for Occupational Safety and Health (NIOSH) standards for particulate filtering respirators includes the following filter series:

A

N: Not resistant to oil

R: Resistant to oil

P: Oil proof

138
Q

A safety data sheet (SDS) is also known as:

A

material safety data sheet (MSDS)

139
Q

A safety data sheet (SDS) is a:

A

document that gives information about particular substances, such as the toner in a laser printer’s toner cartridge

140
Q

Any product that uses chemicals is required to:

A

have a safety data sheet (SDS)

141
Q

A safety data sheet (SDS) includes the following information:

A

Proper treatment if a person comes into contact with or ingests the substance

How to deal with spills

How to handle and dispose of the substance properly

How and where to store the substance

142
Q

Generally, substances that contain chemicals should be stored in:

A

a cool (68-76 degrees), dry place (20-60% humidity), away from sunlight. This is often a storage closet.

143
Q

As far as disposal goes, any substance with an (SDS) should usually be:

A

recycled according to the procedures documented in the (SDS)

144
Q

For air treatment, organizations should use:

A

filtration devices, electronic cleaners, and possibly chemical treatments activated with charcoal or other sorbents

145
Q

Blackouts are a:

A

total loss of power for an extended period of time

146
Q

Brownouts are:

A

sustained voltage drops of as much as half of rated output. Can last for minutes to hours

147
Q

Blackouts and Brownouts stop:

A

computers and peripherals from working

148
Q

Battery backup units are rated in two ways:

A

volt-amps (VA)

watts (W)

149
Q

The usual calculation for comparing W to VA is to assume:

A

VA x .60= W

150
Q

Description; Protective Measure

Power surge

A

Overvoltage event lasting less than 50ms. Up to 6000V and 3000A; Surge suppressor

151
Q

Description; Protective Measure

Sag

A

Momentary voltage drop form 10% to 90% of normal voltage for a few seconds to one minute; UPS

152
Q

Description; Protective Measure

Blackout

A

total loss of power for an extended period of time; UPS or generator

153
Q

Description; Protective Measure

Brownout

A

sustained voltage drops of as much as half of rated output. Can last for minutes to hours; UPS

154
Q

Managing user content, activity, and privacy is challenging because:

A

users and managers do not all understand these concepts in the same way

155
Q

It is important for an organization to go through the process of creating a:

A

well-defined policy spelling out what is and is not acceptable use and practice and providing information about consequences for not complying with the organization’s standards while using its equipment

156
Q

The incident response process, prohibited content and activity can be defined as the following:

A

Any content stored on a company-owned or company-manager computer, mobile device, or network that is contrary to organizational policy

Any activity performed or received by a company-owned or company-manager computer, mobile device, or network that is contrary to organizational policy

157
Q

Incident response is:

A

the set of procedures that any investigator follows when examining a technology incident

158
Q

The initial response and documentation are important because:

A

that information and evidence gathered there will guide the rest of the process

159
Q

When an incident is reported, the responder’s first task is to:

A

identify exactly what happened

160
Q

Once the problem had been identified, it is essential that it be:

A

reported through proper channels, and then steps must be taken to ensure data/device preservation

161
Q

Data/device preservation often means:

A

making a backup of the computer’s image using special software

162
Q

A chain of custody should be:

A

initiated at the start of any investigation and should include tracking of evidence/documenting process, who had custody of the evidence all the way up to litigation (if necessary), and verification that the evidence has not been modified or tampered with

163
Q

It is essential to document:

A

everything that is found and anything that happens after the initial report

164
Q

It’s important to realize that carelessness with licensing could:

A

put your company in financial and legal jeopardy

165
Q

Some issues to watch out for with software licensing include:

A

The limitations created by digital rights management (DRM)

End-user license agreements (EULAs)

Open source vs commercial licenses

Personal license vs enterprise licenses

166
Q

Digital rights management (DRM) is:

A

the general term for software or service mechanisms that limit the end user’s rights to copy, transfer, or use software or digital media

167
Q

An end-user license agreement (EULA) restricts how:

A

an app can be used and what transfer rights are available

168
Q

Commercial licenses limits:

A

how licenses can use the programs

169
Q

Personal licenses are:

A

software licenses provided for computers purchased at retail or online stores and downloaded or packaged apps designed for use by individuals

170
Q

Enterprise licenses can differ from personal software licenses in several ways. Those ways are:

A

Software covered by enterprise licenses include management and security features designed for the enterprise

Software covered by enterprise licenses have much different rules for software upgrades than personal-licensed software

Software covered by enterprise licenses may be licensed per seat, per device, per processor, or in other ways

Some personal software licenses, such as Microsoft Office Home and Student, are specifically restricted from being used in business

171
Q

There are four types of data that is regulated and must be protected by network administrators. They are:

A

Personally identifiable information (PII), such as person’s name, address

Payment Card Industry (PCI) standards that are in place to protect credit cardholder’s data

General Data Protection Regulation (GDPR), enacted in Europe to protect several types of data, including health, biometrics

Protected health information (PHI), which covers health status as well as payment methods, account numbers, and beneficiaries

172
Q

A computer technician’s role in protecting data includes:

A

Configuring systems to use secure cloud storage rather than locally stored sensitive information on laptops and mobile devices

Configuring and using strong encryption on wireless networks and point-of-sale (POS) systems

Using full-disk encryption such as BitLocker, BitLocker To Go or similar products on laptops and mobile devices that store or access sensitive data

Configuring hardware and software firewalls to protect sensitive data

Educating users on methods to remove PII from documents, photos, and other files that might be shared or posted online

173
Q

Effective written and oral communication are:

A

needed to identify and document issues and to train users in how to function in their technical environment

174
Q

Using proper language is one way to:

A

instill confidence in the people who you are trying to help

175
Q

A bad service tech projects:

A

arrogance by rejecting or brushing aside questions and comments

176
Q

A good service tech maintains:

A

the attitude that the problem will be solved

177
Q

Active listening is a:

A

conversational skill that includes making eye contact, taking notes, and encouraging open-ended answers without interrupting

178
Q

Cultural sensitivity helps prevent:

A

barriers to good communication

179
Q

Punctuality is probably the most:

A

important ingredient in customer relationships

180
Q

Solving technology problems is difficult, and customers can make it harder. These tips should help mitigate a difficult situation:

A

No matter how tough the problem (or the customer), avoid arguing with customers and don’t be defensive

Do not minimize customer’s problems

No matter how incorrect their actions or how poor their judgment, avoid being judgmental of your customers

Clarify customer statements

Don’t disclose experiences on social media

181
Q

There are many ways expectation and communication can be strengthened, including the following:

A

Coming in the door with a smile and getting right to work on determining the problem sets the tone for the customer’s experience

Create a timeline of the steps and when you expect to meet them, communicate the status with the customer often

If applicable, offer different repair/replacement options and allow the customer to select the one that works best in the situation

Provide and organize proper documentation of any services and products that are offered

Follow up with the customer at a later date to verify continued satisfaction

182
Q

What can protect a technician from any suspicion later on?

A

Asking a customer to move confidential materials such as bank statements, accounting information, legal documents, and other top-secret company information to another area

183
Q

Script files are:

A

text files that contain instructions, or commands that a computer will follow to perform a task

184
Q

Scripts can be opened, read, or edited with:

A

basic text editors such as Notepad or in special programming environments that assist with commands and testing of scripts

185
Q

Language; Basic Information

.bat

A

Windows batch file; Batch files are script files that are strictly Windows based. They are text files that contain commands or instructions for the command line interpreter to execute

186
Q

Language; Basic Information

.psl

A

PowerShell; is a tool to help technicians and network administrators automate support functions through the use of scripts and snippets

187
Q

Language; Basic Information

.vbs

A

VBScript; a scripting language developed by Microsoft, considered a subset of the Visual Basic programming language. It was designed specifically for use with Microsoft’s IE. It gives web pages a level of interactivity

188
Q

Language; Basic Information

.sh

A

Linux shell script; A text file that contains a sequence of commands for a Linux or UNIX-based system. Shell scripts may not run correctly on a Windows system.

189
Q

Language; Basic Information

.py

A

Python; a good choice for those beginning to learn programming. It is relatively easy to learn, and Python scripts can run on most OSs

190
Q

Language; Basic Information

.js

A

JavaScript; a programming language that has many uses today. It is valuable for creating scripts because it can be run on any OS. It is usually written into web pages to create client interactions, JavaScript is read by the browser

191
Q

Scripts are written in:

A

coding languages humans recognize, and then the code is interpreted into a machine language that the computer uses to execute the commands

192
Q

When writing scripts, coders use:

A

different data types to inform the computer about how to process different kinds of data

193
Q

The basic data types are:

A

Integers

Floating point number

Character

String

194
Q

Description; Examples

Integer

A

Whole numbers; 1

195
Q

Description; Examples

Floating point number

A

Non-whole numbers; 1.5

196
Q

Description; Examples

Character

A

Letter or other special character; A, .,&,%

197
Q

Description; Examples

String

A

String or group of characters; “Hello World”, “numbers to 250”

198
Q

An environmental variable allows:

A

a single script to run yet still have sources in various places

199
Q

Remote access allows:

A

a user to see and control what is going on in another computer or device in a different location

200
Q

Examples of using remote access include:

A

A support technician accessing a client’s computer to troubleshoot or update a PC

A network administrator adjusting settings on a server in another part of the network

A network administrator needing to access a router, switch, firewall, or other network device to manage traffic

201
Q

Remote Desktop Protocol (RDP) was:

A

developed by Microsoft to allow a user to securely connect to a remote computer in order to perform services or support another user

202
Q

Remote Desktop Protocol (RDP) allows:

A

for encrypted access with screen capture, mouse, and keyboard functions

203
Q

Common tasks with the remote connections are:

A

support and management of remote computers

204
Q

Telnet enables:

A

a user to make a text-based connection to a remote computer or networking device and use it as if he or she were a user sitting right in front of it

205
Q

Secure Shell (SSH) allows:

A

data to be exchanged between computers on a secured channel

206
Q

Many large companies use File Transfer Protocol (FTP) to:

A

manage large documents and files that need to be shared to a distributed workforce