Operational Procedures Flashcards
You work for a medium-sized company. You would like to provide secure, remote access between the company’s three Internet-connected sites and their Windows client, servers, and domain controllers. Which option would provide adequate security and cost the least overall?
A) Purchase WAN links between each pair of sites, and run a commercial VPN over IPSec.
B) Use a freeware VNC to run TeamViewer over the Internet.
C) Create a VPN, and run RDP over the VPN.
D) Use IPSec to secure RDP over the Internet with connection security rules and associations.
You should use Internet Protocol Security (IPSec) to secure Remote Desktop Protocol (RDP) over the Internet with connection security rules and associations because it uses only Microsoft-supplied protocols and services. This is the only option that provides an additional layer of encryption and security beyond what is included in RDP or Windows Remote Desktop Connections. The connection security rules and associations work with IPSec to establish how to broker a legitimate RDP connection and to manage proofs of identity and authentication between communicating parties.
A user has contacted you requesting help with an operating system configuration issue. From your computer, you configure an Offer Remote Assistance invitation. What is a valid reason for not being able to create a Remote Assistance connection to the user’s computer?
A) Your user account is not a member of the Power Users group on the user’s computer.
B) Your user account is not a member of the Administrators group on your computer.
C) Your user account is not a member of the Power Users group on your computer.
D) Your user account is not a member of the Administrators group on the user’s computer.
To be able to establish a Remote Assistance session, your user account must be a member of the Administrators group on the user’s computer or be configured as a member of the Remote Assistance Helpers group in Group Policy.
Which factors would generate and promote the transmission of electrostatic discharge (ESD) to devices? (Choose all that apply.)
A) moving people
B) humidity below 40%
C) improper grounding
D) humidity above 40%
E) moving machines
The factors that generate and promote the transmission of ESD are moving machines, moving people, improper grounding, and humidity below 40 percent.
You are an IT technician for a company. You are required to implement Cat5 cabling for your company’s network. The cable will run to each user workstation along the floor. What should you do to secure the cable?
A) Implement a wireless network.
B) Install cables using a protective channel.
C) Use duct tape to secure the cable.
D) Install Cat6 cable instead of Cat5 cable.
You should install cables using protective channels because this will secure the cable from direct physical damage. Cables lying on a floor are vulnerable to damage by user movement. Therefore, you should implement a cable to user workstation using a protective channel.
You should not implement a wireless network because this is an expensive solution in comparison to implementing protective channels around a Cat5 cable.
While servicing a computer at a customer location, you notice a memo regarding an upcoming secret merger that will affect the customer’s publicly traded stock. What should you do?
A) Make a copy of the memo, and sell the memo to the press.
B) Keep the information confidential.
C) Tell your friends about the upcoming merger.
D) Contact your stockbroker and purchase the company’s stock.
An IT technician should never divulge a customer’s confidential data that is learned while servicing a computer at the customer location. Any confidential information that is discovered should be kept confidential.
You are a desktop administrator for Nutex Corporation. A user in the human resources department is unable to open the browser on their computer. You go to the customer’s desk to troubleshoot the problem. While you are there, you notice confidential documents regarding an employee’s recent disciplinary action sitting next to the keyboard.
What should you do?
A) Read the information on the document, and inform your co-workers of its contents.
B) Turn the documents over.
C) Read the information on the document, but keep the information confidential.
D) Store the papers in a drawer.
You should turn the documents over. This will keep the documents in the same place as the customer left them, but will prevent you from reading the confidential contents. This shows respect to the customer’s property while ensuring confidentiality.
You detect the humidity of your server room fluctuating towards the lower side.
What could be the possible effect of low humidity in server room?
A) power fluctuations
B) corrosion
C) electric shock
D) static electricity
Low humidity in the server room can cause static electricity. Static electricity is mainly caused in dry conditions when two dissimilar objects come in contact with each other. This electricity travels through the body and a spark is produced on the fingertips when the person touches something. Static electricity can cause severe damage to electronic computer components, such as the motherboard, hard disk, and random access memory. Therefore, the humidity level in the server room should not be low. Organizations can install a humidifier to maintain the correct level of humidity in the room. Technicians working with internal computer components can also wear anti-static wristbands to prevent damage from static electricity.
All of your telephone support technicians are trained in proper telephone etiquette, but you notice that sometimes you overhear some of them not following all of the techniques suggested. In your weekly team meeting, what can you recommend that they NOT do when dealing with an aggressive customer?
A) Paraphrase what the customer said.
B) Ask for clarification.
C) Ask what would make the situation better.
D) Match the customer’s tone of voice.
They should NOT match the customer’s tone of voice when dealing with an aggressive customer. This would only escalate the situation. You should lower your tone of voice because this tends to help calm the aggressive person.
While servicing some computer equipment, you overhear a conversation about company-wide pay raises. What should you do?
A) Tell your co-workers about the pay raise.
B) Tell your supervisor about the pay raise.
C) Keep the information confidential.
D) Send an anonymous e-mail to all company employees about the pay raise.
Professional behavior and ethics dictates that any confidential information you overhear should be kept confidential. You should never inform anyone, even someone affected by the information, of the details of the confidential information.
You need to configure your Windows 10 computer so that it automatically connects to the Research share on a server named Srv1 each time your computer boots. You want this to be configured as the R drive.
You click Start and Computer. You select the Map Network Drive option. The Map Network Drive dialog box is displayed. What should you do?
A) In the Drive field, select R. In the Folder field, enter \Research\Srv1. Select the Reconnect at Logon option. Click Finish.
B) In the Drive field, select R. In the Folder field, enter \Research\Srv1. Clear the Reconnect at Logon option. Click Finish.
C) In the Drive field, select R. In the Folder field, enter \Srv1\Research. Clear the Reconnect at Logon option. Click Finish.
D) In the Drive field, select R. In the Folder field, enter \Srv1\Research. Select the Reconnect at Logon option. Click Finish.
You should select R in the Drive field, enter \Srv1\Research in the Folder field, select the Reconnect at Logon option, and click Finish.
When explaining new equipment features to a non-technical customer, all of the following are acceptable practices, EXCEPT:
A) Use the correct acronyms with the customer.
B) Avoid interrupting the customer.
C) Sit beside the customer.
D) Make direct statements to the customer.
When communicating with a customer, you should NOT use acronyms or technical jargon. Customers may not understand these terms and will be frustrated because you used them. You should also avoid using technical jargon or slang.
You are the desktop technician for your company. Your company has a strict security policy in place. While troubleshooting the computer issue, you discover that a user has given her password to two co-workers in her department at the request of her supervisor. This is in direct violation of the company’s security policy.
What should you do?
A) Tell the user to change her password and to keep it a secret.
B) Explain the company security policy to the supervisor.
C) Explain the company security policy to the user.
D) Inform your supervisor of the department’s violation of the security policy.
You should inform your supervisor of the department’s violation of the security policy. It is always best practice to inform your supervisor of any security issues and let your supervisor address the situation.
You are a technician working at a client’s residence, and you leave some wires uncovered. A child comes in contact with the uncovered wires and is electrocuted. You rush to help the child.
What should you do FIRST?
A) Give cardiopulmonary resuscitation to the child.
B) Take the child to a doctor.
C) Pull the child away from the wires.
D)Turn off the power supply.
In this scenario, you should first turn off the power supply. Turning off the power supply will ensure that no further damage is caused to the child because of the flow of electricity.
You should not pull the child away from the wires first because this action might also bring you in contact with electricity. To avoid this, you should first turn off the power supply and then pull the child away from the wires.
You should not give cardiopulmonary resuscitation (CPR) to the child first. CPR should be administered to the child only after the child’s contact with electricity has been removed and you have determined they are not breathing. This ensures that the person administering CPR to the child does not come in contact with electricity and even the child is saved from any further caused due to electricity.
Before taking the child to a doctor, you should first pull the child away from wires. After you have pulled the child away from the wires, you must administer CPR to the child if they are not breathing, because an electric shock can cause a heart arrest causing death. After administering CPR, the child should be taken to the doctor for further medical treatment.
You know the IP address of a computer that is downloading copyrighted material. Which of the following would help you identify the location of that computer?
A) Knowledge base/articles
B) Password policy
C) Network topology diagrams
D) Acceptable use policy
If you know the IP address of the computer, the network topology diagram should assist with determining the physical location. The network topology diagram would document the physical location of nodes on the network. It could also detail IP addresses, VLANs, and subnets.
You arrive at a customer’s home to fix a computer. The computer is located in the bedroom of the customer’s 8-year-old daughter. While attempting to fix the problem, the child repeatedly interrupts you and asks questions.
What should you do?
A) Tell the child to leave you alone while you are working.
B) Ask the parent to take the child into another room while you are working.
C) Move the computer into another room where the parent is located.
D) Take the computer back to your office to complete the repair.
If a child or pet is causing distractions while you are working, you should never take it upon yourself to remove the distraction. You should always ask the parent to take the child into another room.
A user informs you that he cannot complete a task for his supervisor without an administrative password. The user will only have to complete this task once.
What should you do to achieve the objective using the least administrative effort?
A) Create a temporary administrative account for the user. Delete the account after the task is complete.
B) Tell the user to ask his supervisor for the supervisor’s account information.
C) Change the user’s account to an administrative level account. Return the account to its original state after the task is complete.
D) Enter the administrative credentials yourself at the user’s computer.
You should walk down to the user’s desktop and specify the administrative credentials yourself that are required for completing the task. Once the task is complete, you should then log out.
You have been assigned a troubleshooting job for a user in the human resources department. When you arrive, you notice that a spreadsheet that contains confidential employee information is open on the user’s computer. What should you do?
A) Close the spreadsheet.
B) Minimize the spreadsheet.
C) Leave the spreadsheet alone as long as the user is present.
D) Ask the user to close the spreadsheet.
You should ask the user to close the spreadsheet. Professional behavior dictates that you should respect the user and the user’s property. You should ask the customer to close all confidential computer documents and put away all confidential printed documents to ensure that you do not inadvertently obtain any confidential information. Asking the user to perform the function ensures that the customer is not offended by your actions and that you do not accidentally cause data loss.
It has been requested that your team make a significant change to the organization’s network infrastructure. Which type of documentation contained in the change plan would allow you to recover if you see that things are not going as hoped?
A)Backout or rollback plan
B)Documented business processes
C)End-user acceptance
D)Purpose of the change
Before implementing the change, you should look for a backout or rollback plan that would allow you to recover should something go awry. When you see that the implementation is not going as planned, the backout plan will allow you return the systems to an operational state. Rollback plans should be thoroughly documented to ensure that when it is necessary to roll back, you are reverting to the proper point. When implementing any change, you should document the date and time when the change was approved and implemented. This enables IT teams to identify when changes were last made to a device or application if a change has begun causing problems so they can roll back the change to the appropriate backup timestamp.
You work in a part of the country where thunderstorms and lightning are frequent and severe. A key computer was severely damaged by a nearby lightning strike, frying the motherboard and damaging the hard drive. For the future, what might you include in your update to the disaster prevention manual?
A) Account recovery options
B) UPS
C) Critical application
D) Surge suppression
A surge suppressor protects against lightning strikes, voltage spikes, and surges from when the power comes back on after an outage. A multi-outlet power strip may or may not have a surge suppressor built into it, so exercise caution when choosing a power strip.
Cathy is opening the case of a computer to add some memory and perform some additional maintenance. She wants to ensure that a static charge is not built up in her body. How can she proceed safely?
A) She should connect her grounding strap to the system board.
B) She should connect her grounding strap to a line voltage source.
C) She should unplug the computer.
D) She should use an ESD strap.
Cathy should wear an electrostatic discharge (ESD) strap to prevent damage to computer components from static charges built up in her body.
Unplugging a computer will not prevent static charges from building up in her body. However, to protect the computer from ESD, you should unplug the computer before performing any maintenance.
The buildup of static electricity on a person wearing synthetic fabric can easily reach 21,000 volts. Whereas a buildup of approximately 750 volts of static electricity is necessary to produce a visible spark, a buildup of only 10 volts can cause damage to computer components. Therefore, ESD can damage components at energy levels too low to be perceptible by human senses. Even if static discharges do not destroy a computer chip, they may decrease the life of the chip.
You want to prevent your computer from any type of electrostatic discharge (ESD) while servicing the computer. Which actions should you NOT perform while servicing the computer? (Choose two.)
A) Keep your one hand in contact with bare metal frame of computer at all times.
B) Ensure that the room in which computer is serviced is cool and dry.
C) Wear cotton clothes.
D) Ensure that the room in which computer is serviced is carpeted.
E) Wear an anti-static wristband.
To prevent ESD, you would NOT ensure that the room in which computer is serviced is carpeted or that the room is cool and dry. Carpets are known to be conductors of ESD and should never be placed in computer rooms. Cool and dry conditions are prone to generating static electricity. To prevent ESD, humidity in the server room should be maintained between 40 and 60%. Below 40% allows the generation of static electricity, and above 60% may allow the development of condensation on equipment.
Metroil, Inc. uses custom software to monitor industrial equipment used in its manufacturing facilities nationwide. As the Azure administrator, you have been asked to add this software to multiple Windows Server virtual machines. The software requires several Windows Server features to be installed as well as a few registry modifications.
You have decided that you can streamline this process by using PowerShell’s Desired State Configuration (DSC) capabilities. You have created the DSC configuration script on-premises in PowerShell ISE, and are ready to test it on the Azure VM named Monitor1.
You need to complete the appropriate steps for this task. You plan to perform three steps:
- (MISSING)
- Run the Publish-AzureVMDscConfiguration cmdlet with parameter values.
- Apply the DSC to the Monitor1 VM using the Set-AzureVMDscConfiguration cmdlet.
Which action should you perform for the first step that is marked with the MISSING graphic?
A) Save the script with a .py extension.
B) Save the script with a .js extension.
C) Save the script with a .ps1 extension.
D) Save the script with a .sh extension.
You will save the script with a .ps1 extension. A .ps1 file is a text that contains a series of PowerShell commands that can be run from the PowerShell prompt. In this scenario, you are creating a PowerShell script that will use several PowerShell commands to create the Desired State Configuration (DSC) that will optimize the configuration of virtual machines.
You work in a multinational organization. Your colleagues in Germany ask how you are doing with meeting the requirements of GDPR. To what do they refer?
A) Password policy
B) Regulatory and compliance policies
C) Knowledge base/articles
D) Incident documentation
They are referring to regulatory and compliance policies. Any company doing business in the European Union, or that handles the personal data of EU citizens in any location, must comply with the General Data Protection Regulation (GDPR). A strong regulatory and compliance policy should ensure that the organization’s policies and procedures are consistent with local, national, and international regulations.
You remove the toner cartridge from a laser printer. What should you do with it?
A) Deposit it in a municipal trash bin.
B) Refill it with general-purpose toner.
C) Return it to the manufacturer for recycling.
D) Send it to a standard plastic recycling center.
You should return the empty toner cartridge to the manufacturer for recycling. Laser printers use toner cartridges that can usually be refurbished and refilled by the manufacturer. The toner in a particular brand or model of cartridge has a specific formulation, and using a cartridge with the wrong toner may ruin your printer.
Toner cartridges, circuit boards, batteries, and other computer components typically include recommendations from the manufacturers regarding any special requirements they may have for recycling or disposal.
You are an on-site technician and are at a customer site to perform server room maintenance. You notice that water has entered the server room from a leaking water pipe. You call building maintenance to alert them to the problem. You then inform the network administrator that water in the server room may void the server warranty. You then wear rubber-soled shoes to perform the maintenance work.
What could be the reason for wearing rubber-soled shoes?
A) Wearing rubber-soled shoes allows static charge to pass from the ground through your body.
B) Wearing rubber-soled shoes completes the circuit between the electric wire and ground.
C) Wearing rubber-soled shoes does not allow electric current to pass from the ground through your body.
D) Wearing rubber-soled shoes does not allow static charge to pass from the ground through your body.
Rubber-soled shoes are worn for maintenance of server rooms because rubber-soled shoes will not allow electric current to pass from the ground through your body. When working with electrical appliances, you should be careful not to allow electric current to pass from the ground through your body. Rubber is a non-conductor, or insulator, of electricity and does not allow electricity to pass through the body. If there is water in the server room, you must wear rubber-soled shoes to avoid any contact with water or Electricity.
In this scenario, rubber-soled shoes are worn to protect you against electric current, and not as a protection against static charge.
You have been hired as an IT technician to repair computers and other devices for a large corporation. Which device is most likely to contain internal components that can cause burns?
A) laptop computer
B) laser printer
C) inkjet printer
D) desktop computer
The most likely device to contain internal components that can cause burns is a laser printer. The printer fuser is usually very hot for a long period of time, even after you turn the printer off.
You are a help desk technician for your company. Several hours into the day, you receive your first technical call from a customer. Your radio is on, and you are in the process of eating your lunch. What should you do?
A) Continue what you are doing while talking to the customer.
B) Turn off your radio, stop eating, and listen to your customer.
C) Get the customer’s contact information, and call them back later.
D) Transfer the customer to a co-worker.
To engage in the active listening process, you should remove all distractions. Because the radio is a distraction, you should turn off the radio. You should also stop eating. Participating in a conversation and assuring the speaker that they are being heard is active listening.
You use two different backup and recovery options. For full backups, you use cloud storage, and for incremental backups you use local storage. Which type of backup is an incremental backup of the data source?
A) File-level backup
B) Synthetic backup
C) Critical applications backup
D) Image-level backup
E) Account recovery
An incremental backup is a file-level backup. Differential backups are file-level backups as well. Both methods back up any files changed since the last full backup; those files are indicated by a flagged archive bit. Incremental backups typically back up the files changed since the last full or incremental backup, whereas differential backups back up all files changed since the previous full backup.
All of the following are examples of pirated software, EXCEPT:
A) installing OEM software from the same installation CD on multiple computers
B) installing software from the same installation CD on multiple computers
C) installing an application using an installation CD with the application name written on it
D) installing software from the same installation CD using multiple licenses
Installing software from the same installation CD using multiple licenses is legal. This is NOT an example of pirated software. As long as a company has purchased multiple licenses for software, it does not matter the installation medium used as long as the company does not go over the amount of licenses purchased.
All of the other options are examples of pirated software. Installing software from the same installation CD on multiple computers is illegal UNLESS multiple licenses have been purchased from the software vendor. OEM software is packaged to sell with certain hardware. Selling and purchasing OEM software for installation is illegal. Installing an application using an installation CD with the application name written on it is illegal UNLESS the copy is an archived copy that was made when the software was purchased. Archived copies are created and retained in the event that the original installation media is lost or damaged, thus making installation from the original media impossible.
Licensing, digital rights management (DRM), and end-user licensing agreements (EULAs) must be fully understood by all technicians. Users should also understand the implications of installing pirated software. Open source software has different licensing than commercial software, and the differences should be clearly spelled out. Users must also be educated on personal versus enterprise licenses.
You have been an IT technician at the same company for several years. Over the years, the company has continued to grow, hiring new workers annually, and increasing the workload of the IT support team. Your manager has decided to implement a ticketing system to manage the large number of IT support requests, and has tasked you with implementing this system. Which of the following would be important elements needed within a ticketing system? (Choose three).
A) Ticket severity levels
B )Warranty and licensing information
C) Network topology information
D) Ticket categorization
E) User and device information
A ticketing system would need to support ticket severity levels, user and device information, and ticket categorization. Ticket severity levels help prioritize which tickets need to be addressed first. These severity levels should reflect the business impact of the reported issue. Urgent tickets would require immediate attention, as they can cause a complete loss of service or a loss of a significant feature, whereas a normal level ticket would only cause a minor loss and would be seen more as an inconvenience.
A ticketing system should support user and device information so the IT support team can understand who is filling the ticket, what their role is within the company, which device is experiencing issues, and what that device’s specifications are. This information is critical for IT teams to be able to respond quickly and more effectively.
Ticket categorization is also important when helping to organize and manage a large volume of tickets. With ticket categories, the IT team can coordinate, understand issues, and respond more effectively. Common categorizations would be servers, change requests, desktop software, desktop hardware, networking, and website. Categories can also be made for an organization’s various departments such as sales, human resources, product development, and operations. Categories can be designed differently for each organization for their individual needs.
Mary has inherited a bunch of older laptops that need their batteries replaced. Which statements are true regarding proper disposal of unusable and old Ni-cad batteries that she should utilize?
A )Unusable Ni-cad batteries should be thrown in a water body.
B) Unusable Ni-cad batteries can be thrown in the garbage.
C) Unusable alkaline batteries should be handed over to the supplier.
D) Unusable alkaline batteries should not be thrown in the garbage.
E) Unusable Ni-cad batteries should be given to a hazardous waste disposal facility.
Old and unusable Ni-cad batteries should be given to a hazardous waste disposal facility. Old and unusable Ni-cad batteries are considered hazardous waste. Therefore, care must be taken while disposing these batteries. These batteries should either be given to the waste disposal facility or be handed over to the supplier. Both a waste disposal facility and the supplier will ensure that these batteries are properly recycled.
The options stating that unusable Ni-cad batteries can be thrown in garbage or a water body are incorrect. Unusable Ni-cad batteries are considered hazardous waste, and, therefore, should not be disposed either in garbage or water body. Utmost care should be taken while disposing the unusable and old Ni-cad batteries.
A customer has contacted you and is angry about your company’s service. During the call, you discover that another technician responded initially to the customer’s issue.
What should you do first?
A) Stay calm.
B) Ask for clarification.
C) Transfer the customer to the technician who initially handled the issue.
D) Ask the customer what would make the situation better.
The first thing you should always do when dealing with an angry customer is to remain calm. It is important that customers feel that someone understands their problem. The only way you can convey this feeling is to remain calm. Remembering not to take the situation personally is the next important point.
While asking for clarification is an important step, it is not the first step you should take. You should only complete this step once you have listened to the customer’s entire complaint. Hearing out the initial complaint is important to helping to diffuse the customer’s anger.
You should ask the customer what would make the situation better but only after listening to the customer’s initial complaint and analyzing the issue. In most cases, the customer has not stopped to think about how to improve the situation. Asking the customer for suggestions can begin the problem-solving process.
You should never transfer the customer to the technician who initially handled the issue. This can increase the frustration level for the customer. You should attempt to handle the situation if at all possible. If that is not possible, the customer should be transferred to a supervisor.