Domain 5: Operation Procedures Flashcards
Which are equipment grounding methods? Choose three answers.
Choices:
A - Wall B - Earth C - Signal D - Ceiling E - Chassis
B - Earth
C - Signal
E - Chassis
Hard drives should be stored in which item when they are not in use?
Choices:
A - Computer
B - Antistatic bag
C - Cardboard box
D - Plastic container
B - Antistatic bag
Which is a self-grounding practice used while working on a computer?
Choices:
A - Wear a hazmat suit
B - Touch an antistatic bag
C - Stand on a non-metal surface
D - Touch the metal of the computer case once in a while
D - Touch the metal of the computer case once in a while
Which materials need to be properly disposed of as they are considered toxic? Choose three answers.
Choices:
A - Paper B - Toner C - Plastic D - Batteries E - CRT monitors
B - Toner
D - Batteries
E - CRT monitors
Which article of clothing should never be worn when working on the inside of a computer?
Choices:
A - Hat
B - Loose jewelry
C - Safety goggles
D - Long-sleeve shirt
B - Loose jewelry
Which is a proper lifting technique?
Choices:
A - Lift with the legs
B - Lift with the back
C - Lift with the arms
D - Bend over while lifting
A - Lift with the legs
A fire extinguisher with which rating will put out electrical fires?
Choices:
A - A
B - B
C - C
D - D
C - C
Which items should a technician wear to protect the face from particles and odors? Choose two answers.
Choices:
A - ESD mask
B - ESD goggles
C - Air filter mask
D - Safety goggles
C - Air filter mask
D - Safety goggles
An MSDS contains information for proper disposal of __________.
Choices:
A - gold
B - OSHA
C - platinum
D - potentially hazardous material
D - potentially hazardous material
Which temperature in Celsius is considered too high for most computers?
Choices:
A - 15 degrees
B - 25 degrees
C - 35 degrees
D - 45 degrees
D - 45 degrees
Which actions can cause ventilation problems in computers? Choose two answers.
Choices:
A - Dust
B - Light
C - Adding components
D - Removing components
A - Dust
C - Adding components
Surge suppressors protect against which item?
Choices:
A - Sag
B - Spike
C - Blackout
D - Brownout
B - Spike
Which devices should be used to clean an area of dust particles?
Choices:
A - Air masks
B - Air filters
C - Heat sinks
D - Enclosures
B - Air filters
Which types of equipment are subject to local government waste disposal regulations? Choose two answers.
Choices:
A - Cable
B - Modems
C - Monitors
D - Computers
C - Monitors
D - Computers
Which are the three steps a first responder will take in response to an incident?
Choices:
A - Identify B - Data backup C - Secure the premises D - Data and device preservation E - Report though proper channels
A - Identify
D - Data and device preservation
E - Report though proper channels
A member of the IT team is the first responder for a company incident. This is the first incident the technician has been involved with. Which item should the technician review while handling the incident?
Choices:
A - Escape plan
B - Phone numbers
C - Incident documentation
D - Passwords and certificates
C - Incident documentation
Tracking evidence involved in an incident is part of which item?
Choices:
A - Chain of custody
B - Device preservation
C - Incident identification
D - Use of documentation
A - Chain of custody
An IT supervisor wants to order enough Microsoft Office licenses to cover the entire list of end users in a company. Which type of license is the IT supervisor most likely to obtain?
Choices:
A - Open
B - Personal
C - Enterprise
D - Commercial
C - Enterprise
Which are examples of personally identifiable information? Choose three answers.
Choices:
A - Face B - Nickname C - Date of birth D - VAL number E - Home address
A - Face
C - Date of birth
E - Home address
Which is a reason to use proper language when talking about computers?
Choices:
A - It is universal
B - It is the only way to talk
C - It can help technicians who speak multiple languages
D - It will help users understand what the technician is doing
D - It will help users understand what the technician is doing
Active listening is the act of letting a customer or user finish what they are saying.
A - True
B - False
A - True
Which item should technicians pay close attention to when being culturally sensitive?
Choices:
A - Food
B - Sports
C - Stock market
D - Professional titles
D - Professional titles
Which items can distract a technician from a customer? Choose three answers.
Choices:
A - IP address B - Social media C - Text message D - Server functionality E - Phone call from a co-worker
B - Social media
C - Text message
E - Phone call from a co-worker
Which individuals will need to be notified if a technician finds private information out in the open? Choose two answers.
Choices:
A - Supervisor
B - Business owner
C - Technician’s mother
D - Technician’s subordinate
A - Supervisor
B - Business owner
Which items are associated with corporate policies and procedures? Choose three answers.
Choices:
A - Group Policy B - Downtime policy C - Acceptable use policy D - Technical use process E - Change management process
B - Downtime policy
C - Acceptable use policy
E - Change management process
Which is a part of establishing a theory of probable cause?
Choices:
A - Research
B - Networking
C - Troubleshooting
D - Tracking evidence
A - Research
Which actions should be taken if the original theory is not correct? Choose two answers.
Choices:
A - Escalate the issue
B - Establish a new theory
C - Establish probable cause
D - Figure out the steps needed to resolve the problem
A - Escalate the issue
B - Establish a new theory
A technician should __________ when documenting what they did to solve a problem on a machine or system.
Choices:
A - use slang
B - be casual
C - use jargon
D - be specific
D - be specific