OP 2 Flashcards

1
Q

What is the purpose of an incident report?

A

An incident report documents security breaches, system failures, or unusual activities for analysis and future prevention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is version control important in IT documentation?

A

Version control ensures accurate tracking of document updates and prevents conflicts between changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the importance of a service-level agreement (SLA)?

A

An SLA defines the expected service performance, response times, and responsibilities between a provider and a client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What safety precaution should be taken when handling heavy IT equipment?

A

Use proper lifting techniques and ask for assistance when lifting heavy equipment to prevent injury.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What should you do before replacing a laptop battery?

A

Turn off the laptop, unplug it, and follow proper disposal guidelines for old batteries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is it important to ensure proper ventilation for IT equipment?

A

Proper ventilation prevents overheating and prolongs the lifespan of IT components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What safety measure should be taken when using power tools in IT work?

A

Wear protective gear, ensure cables are secured, and follow manufacturer guidelines to prevent accidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is using non-technical language important when communicating with end users?

A

Using non-technical language ensures users understand instructions and troubleshooting steps without confusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What should a technician do if they cannot resolve a user’s issue?

A

Escalate the issue to the appropriate support level or expert while keeping the user informed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is documenting troubleshooting steps important in IT support?

A

It helps track solutions, prevent repeated issues, and assists other technicians with similar problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is proper disposal of printer toner and ink cartridges important?

A

Improper disposal can release toxic chemicals into the environment; they should be recycled properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is e-waste recycling and why is it necessary?

A

E-waste recycling ensures safe disposal of electronic devices, preventing hazardous material contamination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should be done before disposing of or recycling a hard drive?

A

Use data wiping software or physically destroy the drive to prevent data recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Personally Identifiable Information (PII) and how should it be handled?

A

PII includes data like names and Social Security numbers; it should be stored securely and shared only with authorized personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is GDPR and how does it affect IT operations?

A

The General Data Protection Regulation (GDPR) enforces strict data privacy laws, requiring user consent for data collection and secure data handling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a clean desk policy and why is it important?

A

A clean desk policy ensures that sensitive documents and devices are not left unattended to prevent unauthorized access.

17
Q

What is the first step when responding to a security breach?

A

Contain the breach to prevent further damage before investigating and resolving the issue.

18
Q

Why should end users be trained in cybersecurity awareness?

A

Users are the first line of defense against phishing, social engineering, and malware attacks.

19
Q

What is the best practice for handling confidential information sent via email?

A

Use encryption and verify recipients before sending sensitive data via email.