Chapter 9 Operational Procedures MC Flashcards

1
Q

Jennifer has asked for a document showing the LANs and IP addresses in the
building. What kind of document did she request?

IP address directory

Logical topology

Netspace directory

Physical topology

A

Logical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Enrique has been asked to attend a meeting to report on how proposed network changes will affect his workgroup. Which term best describes the meeting he will attend?

Scope impact meeting

CIO roundtable

Change management meeting

Disaster prevention meeting

A

Change management meeting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A power outage in Centerville took down the network operations center, but
all equipment was safe as it could run while it powered down. What device was
installed to make this possible?

Circuit breaker

Cloud backup

Surge suppressor

UPS

A

UPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

According to building codes, what does every grounded outlet used for computers connect to?

The neutral circuit in the wiring closet

A copper pipe buried underground

The hot wire circuit cutoff

A UPS in the server room

A

A copper pipe buried underground

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Gina was upgrading graphics cards on 10 PCs in a design office. After she
removed the old cards, she had to use scissors before installing the new ones.
Why would she need scissors in her tech bag?

To trim the plastic tabs off the power connectors

To cut “installed on” tags noting the date to mail back to the manufacturer

To cut the tape on the bubble wrap around the new cards

To open antistatic bags

A

To open antistatic bags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of an ESD strap?

To equalize potential

To seal antistatic bags

To ground PC power supplies while unplugged

To eliminate electromagnetic interference on the fiber lines

A

To equalize potential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When a workstation installation creates a tripping hazard, which best practice
is not being practiced?

Cable management

Disaster prevention

Acceptable use policy

Self-grounding

A

Cable management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Eric comes across a box containing a chemical in use in the building that has spilled
in the main aisle of the warehouse. What should he do before sweeping it up?

Call 911

Rope off the area and evacuate the building

Consult the chemical hot sheet

Consult the SDS

A

Consult the SDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Jacob is upset because he can only use a particular app on three of his four
computers. His fourth computer is capable of running it, but he doesn’t want to pay more. Which of the following are keeping him from just adding the app to his machine without paying more? (Choose two.)

DRM

GDPR

EULA

PHI

A

DRM

EULA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which is not a type of regulated data?

PCI

GDPR

DRM

PII

A

DRM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the name for a set of procedures that an investigator follows when
examining a technology incident?

Incident response

AUP

DRM

EULA

A

Incident response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following are examples of appropriately dealing with a customer’s confidential and private materials? (Choose two.)

Mary asks a client to move her handbag away from the work area.

Bob turns off his cell phone when talking to customers.

Alexandria is assisting in a doctor’s office and asks for insurance files to
be removed from the workstation.

Ali refuses an offer to eat lunch in the discounted employee cafeteria

A

Mary asks a client to move her handbag away from the work area.

Alexandria is assisting in a doctor’s office and asks for insurance files to
be removed from the workstation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which programming language is the file extension .sh associated with?

Python

PowerShell

123 and 48

Linux

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is an example of a string?

189.3

27

“5 things I like to eat.”

4*5%

A

“5 things I like to eat.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of these is a proprietary desktop sharing application?

DRM

RDP

EULA

SDS

A

RDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following statements best defines ESD?

Electronic shutdown device

Electrostatic discharge

Environmentally sustainable development

Energy sensitive differential

A

Electrostatic discharge

17
Q

Which of the following can be used as protection against ESD? (Choose all
that apply.)

An antistatic bag

A 3-wire to 2-wire adapter

An ESD mat

An ESD strap

A

An antistatic bag

An ESD mat

An ESD strap

18
Q

Which of the following increases the likelihood of ESD?

Carpet on the floor

Increasing the humidity of the room

Increasing the room temperature

Rubber-soled shoes

A

Carpet on the floor

19
Q

Which of the following best describes how to dispose of used batteries?

Open the batteries and very carefully remove their lead cores before
recycling.

Recycle batteries in the recycling bin.

Recycle NiMH and Li-Ion in the recycling bin; NiCad batteries can be
disposed of in the trash.

Return the batteries to an electronics store for recycling

A

Return the batteries to an electronics store for recycling

20
Q

Which of the following is a hazard posed by a CRT monitor?

A CRT display presents an electrical shock hazard.

A CRT display presents a fire hazard due to overheating.

A CRT display presents a radiation hazard through the CRT display screen.

A CRT display presents a toxic chemical hazard.

A

A CRT display presents an electrical shock hazard.

21
Q

Which class of fire extinguisher should be used on an electrical fire?

Class A

Class B

Class C

Class D

A

Class C

22
Q

When selecting an air filter mask, which category provides the highest level of
protection?

A

N

P

R

A

P

23
Q

Which of the following statements best describes an MSDS?

An MSDS provides simultaneous accessibility to multiple data sources.

An MSDS provides safety information concerning storage, spills, and
accidental exposure to dangerous chemicals.

An MSDS helps protect computer components from damage due to ESD.

An MSDS is a legal document used to establish chain of custody in legal
cases

A

An MSDS provides safety information concerning storage, spills, and
accidental exposure to dangerous chemicals.

24
Q

Which of the following is the term for a short increase in AC voltage?

Blackout

Brownout

Whiteout

Power surge

A

Power surge

25
Q

Which of the following best describes the function of a UPS in a technology
environment?

A UPS is a battery backup.

A UPS is a rating for system performance.

A UPS is a security program.

A UPS is a package delivery company.

A

A UPS is a battery backup.

26
Q

Which of the following best describes chain of custody?

Chain of custody is documentation of the ownership of a computer or of computer components.

Chain of custody is documentation of who was in possession of evidence
relative to an investigation.

Chain of custody is documentation of how a computer was repaired, such as what was done and who did it.

Chain of custody is documentation of possession of a computer, not
related to ownership.

A

Chain of custody is documentation of who was in possession of evidence
relative to an investigation.

27
Q

Which of the following best describes open source software? (Choose all that
apply.)

Open source software can be used for free.

Open source software can be used for commercial purposes.

Open source software can be sold.

Open source software can be modified.

A

Open source software can be used for free.

Open source software can be used for commercial purposes.

Open source software can be sold.

Open source software can be modified.

28
Q

As a computer technician, what can you do to help your clients protect their
personal information? (Choose all that apply.)

You can advise them to store their sensitive information using cloud storage instead of local storage.

You can advise them to use BitLocker encryption.

You can advise them to store sensitive information on a PC’s hard drive
rather than with the backup files.

You can advise them to use firewalls to prevent hacker intrusions.

A

You can advise them to store their sensitive information using cloud storage instead of local storage.

You can advise them to use BitLocker encryption.

You can advise them to use firewalls to prevent hacker intrusions.

29
Q

Which of the following statements describes the best way to explain a problem
to a customer?

Use as much technical vocabulary as possible because this makes you
sound knowledgeable and will impress the customer.

Explain as little as possible because the customer probably would not
understand the explanation, and it would only confuse him.

Explain the problem in non-technical terms and offer to show the customer what the problem was and how you fixed it.

Ask the customer not to be concerned about the details and assure him
that you will take care of the problem.

A

Explain the problem in non-technical terms and offer to show the customer what the problem was and how you fixed it.

30
Q

Ellen is working on a workstation in the Accounting department. In an open
browser tab she notices a meme with racist comments and graphic pictures.
What is the next step Ellen should take?

Finish fixing the problem and warn the user that this content is against
the AUP

Call corporate security

Contact her supervisor

Contact the user’s supervisor

A

Contact the user’s supervisor

31
Q

Fatima was helping Mark, a new employee having trouble accessing the network folders he needed for his new assignments. When she asked him to
describe the problems, she took notes, did not interrupt, and restated his problem in her own words to make sure she understood. Which customer service
skill was Fatima demonstrating?

Presumptive listening

Cultural sensitivity

Active listening

Dealing with a difficult customer

A

Active listening

32
Q

Martin, a tech support worker on a macOS helpdesk, took a support call
from Sarah, and he soon determined that Sarah’s laptop needed a few settings changed. He had Sarah allow him secure access to her desktop, and he was able to control her mouse and make the necessary changes. Which protocol is it likely that Martin and Sarah’s computers were using during that help session?

Telnet

RTP

RDP

FTP

A

RDP

33
Q

Jess and Hiroko have to update several computers, and their lab manager has
written a basic script to speed up the process. They are given a flash drive with four files on it, but the one they want is written in a shell for Linux machines.
Which file extension is likely the one they want to use?

update. js
update. sh
update. py
update. bat

A

update.sh

34
Q

When Josh is unable to answer a question about a new type of software coming on the market and how his customer might implement it, what action
should he take?

Give the best answer possible with the knowledge he has

Look for a whitepaper online

Send the client to the software developer’s web page

Refer the question to his boss

A

Look for a whitepaper online

35
Q

When Carla, who works in payroll, got to work one day and realized she no
longer had access to employee wellness bonus pay information that was key to her job. Later she found out that the health care provider implemented a new reporting system that separated accounting reports from private wellness records. What is this most likely an example of?

Not getting stakeholder feedback

Poor password management

Domain failure

The knowledge base not being updated

A

Not getting stakeholder feedback