Operational Procedures Flashcards

(38 cards)

1
Q

A technician needs to perform after-hours service starting at 10:00 p.m. The
technician is currently 20 minutes late. The customer will also be late. Which of the
following should the technician do considering proper communication techniques and professionalism?

A. Do not notify the customer if arriving before the customer.
B. Dismiss the customer and proceed with the after-hours work.
C. Contact the customer if the technician is arriving late.
D. Disclose the experience via social media

A

C. Contact the customer if the technician is arriving late.

Explanation:
Proper communication and professionalism require informing the customer about
any delays.

Breakdown of Each Choice:
* A. Do not notify the customer if arriving before the customer.
o Incorrect: Fails to communicate and can create confusion.
* B. Dismiss the customer and proceed with the after-hours work.
o Incorrect: Disregards the customer’s involvement and needs.
* C. Contact the customer if the technician is arriving late.
o Correct: Ensures clear communication and professionalism.
* D. Disclose the experience via social media.
o Incorrect: Unprofessional and violates privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An organization is creating guidelines for the incorporation of generative AI solutions. In which of the following would these guidelines be published?
A. Standard operating procedure
B. Acceptable use policy
C. Security protocols
D. Data flow diagram

A

B. Acceptable use policy

Explanation:
Guidelines for incorporating generative AI solutions would be published in the organization’s Acceptable Use Policy, which outlines acceptable and unacceptable
technology use.

Breakdown of Each Choice:
* A. Standard operating procedure:
o Incorrect: Typically outlines routine tasks, not AI guidelines.
* B. Acceptable use policy:
o Correct: Defines acceptable technology use, including guidelines for AI solutions.
* C. Security protocols:
o Incorrect: Focuses on security measures, not AI guidelines exclusively.
* D. Data flow diagram:
o Incorrect: Illustrates data flow, not AI guidelines specifically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A technician needs to back up a small business’s entire network that includes ten
workstations. Which of the following methods should the technician use to safely and securely back up the business’s network?
A. Cloud storage
B. RAID
C. Tape drive
D. Local backups

A

A. Cloud Storage

Explanation:
Cloud storage offers secure, off-site backup with accessibility from anywhere,
providing redundancy and scalability.

Breakdown of Each Choice:
* A. Cloud storage:
o Correct: Provides secure off-site backup with accessibility and
scalability.
* B. RAID:
o Incorrect: Provides disk redundancy but is not a backup solution on
its own.
* C. Tape drive:
o Incorrect: Less common and slower compared to cloud storage.
* D. Local backups:
o Incorrect: Lacks off-site protection offered by cloud storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A user reports being unable to access a sports team’s website on an office computer. The administrator tells the user this blocked access is intentional and based on company guidelines. Which of the following is the administrator referring to?
A. NDA
B. AUP
C. VPN
D. SOP

A

B. AUP

Explanation:
An Acceptable Use Policy (AUP) outlines the rules and guidelines for using the organization’s network and resources. It often includes restrictions on accessing certain types of websites, such as sports sites, to ensure appropriate use of company resources.

Breakdown of Each Choice:
* A. NDA (Non-Disclosure Agreement):
o Incorrect: An NDA is a legal contract to keep certain information
confidential, not related to website access policies.
* B. AUP (Acceptable Use Policy):
o Correct: Defines acceptable use of the organization’s resources,
including internet access restrictions.
* C. VPN (Virtual Private Network):
o Incorrect: A VPN provides secure remote access to a network but
does not set usage policies.
* D. SOP (Standard Operating Procedure):
o Incorrect: An SOP outlines standard procedures for tasks but does not typically address internet usage policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following items require special e-waste recycling? (Choose two.)
A. Solid-state drive
B. A/C adapter
C. Surge protector
D. Laptop battery
E. CRT monitor
F. Power supply

A

D. Laptop Battery
E. CRT Monitor

Laptop Battery:
* Why it requires special recycling:
Laptop batteries contain hazardous materials, including lithium-ion
cells.
These materials can be harmful to the environment if not disposed of properly.

CRT Monitor (Cathode Ray Tube):
* Why it requires special recycling:
CRT monitors contain leaded glass tubes.
Lead is toxic and poses environmental risks if not managed correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multiple users routinely record log-in information in readily accessible areas. Which of the following is the best way to mitigate this issue?
A. Trusted sources
B. Valid certificates
C. User training
D. Password manager

A

C. User Training

Explanation:
User training is the best way to address the issue of users recording log-in
information in easily accessible areas. Training can help users understand the
importance of password security and the risks associated with improper handling
of log-in information.

Breakdown of Each Choice:
* A. Trusted sources:
o Incorrect: Refers to ensuring software and data come from reliable
sources, not directly related to handling log-in information.
* B. Valid certificates:
o Incorrect: Relates to ensuring secure connections and data integrity,
not about user behavior with passwords.
* C. User training:
o Correct: Educates users on proper security practices, including the
risks of recording passwords in accessible areas.
D. Password manager:
o Incorrect: While useful for storing passwords securely, it does not
directly address the need to change user behavior through education.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A large company is changing its password length requirements. The Chief Information Officer is mandating that passwords now be at least 12 characters long, instead of 10. Which of the following should be used to adjust this setting?
A. Group Policy
B. User accounts
C. Access control lists
D. Authenticator applications

A

A. Group Policy

Explanation:
Group Policy is a feature in Windows that allows administrators to manage settings
and configurations for users and computers within an Active Directory
environment. Changing the password length requirement is a policy that can be
enforced using Group Policy.

Breakdown of Each Choice:
* A. Group Policy:
o Correct: Allows administrators to enforce password policies, including
length requirements, across all users in the organization.
* B. User accounts:
o Incorrect: This is where individual user settings are managed, but it
does not enforce password policies organization-wide.
* C. Access control lists:
o Incorrect: Used to define permissions for accessing resources, not for
setting password policies.
* D. Authenticator applications:
o Incorrect: These are used for multi-factor authentication, not for
setting password policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A developer reports that a workstation’s database file extensions have been changed from .db to .enc. The developer is also unable to open the database files manually. Which of the following is the best option for recovering the data?
A. Accessing a restore point.
B. Rebooting into safe mode
C. Utilizing the backups
D. Using an AV to scan the affected files

A

C.Utilizing the backups

Explanation:
The change of file extensions from .db to .enc suggests that the files may have been encrypted, possibly due to ransomware. The best way to recover the data in this scenario is to use backups that were made before the files were encrypted.

Breakdown of Each Choice:
* A. Accessing a restore point:
o Incorrect: Restore points might not recover the actual database files,
as they are more geared towards system settings and applications.
* B. Rebooting into safe mode:
o Incorrect: Safe mode helps in diagnosing and troubleshooting issues
but will not decrypt the files.
* C. Utilizing the backups:
o Correct: Restoring from backups made prior to the encryption is the
most reliable way to recover the original database files.
* D. Using an AV to scan the affected files:
o Incorrect: While an antivirus can remove the malware, it will not
decrypt or recover the already encrypted files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A technician needs to configure security settings on a Windows 10 workstation.
Which of the following should the technician configure to limit password attempts?
A. Account Lockout Policy
B. User Access Control
C. System Protection
D. Firewall

A

A. Account Lockout Policy’

Explanation:
The Account Lockout Policy allows administrators to set limits on the number of incorrect password attempts a user can make before their account is locked out, effectively limiting password attempts.

Breakdown of Each Choice:
* A. Account Lockout Policy:
o Correct: Controls the number of failed login attempts before an account is locked out, limiting password attempts.
* B. User Access Control:
o Incorrect: User Access Control (UAC) is a security feature that controls
system prompts, not password attempts.
* C. System Protection:
o Incorrect: Manages system restore points, unrelated to limiting
password attempts.
* D. Firewall:
o Incorrect: Regulates network traffic, not related to limiting password
attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An administrator needs to select a method to dispose of SSDs containing sensitive data. Which of the following are the most appropriate methods? (Choose two.)
A. Degauss
B. Delete
C. Incinerate
D. Recycle
E. Format
F. Shred

A

C. Incinerate
F. Shred

Physical destruction is the best way to ensure disposal given the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An IT services company that supports a large government contract replaced the
Ethernet cards on several hundred desktop machines to comply with regulatory requirements. Which of the following disposal methods for the noncompliant cards is the most environmentally friendly?
A. Incineration
B. Resale
C. Physical destruction
D. Dumpster for recycling plastics

A

B. Resale

Explanation:
* A. Incineration: Not environmentally friendly as it releases pollutants and
wastes resources.
* B. Resale: Environmentally friendly because it extends the lifecycle of the
cards by allowing others to use them, reducing waste.
* C. Physical destruction: Not environmentally friendly as it prevents reuse
and may result in hazardous waste.
* D. Dumpster for recycling plastics: While better than incineration or
landfill, it may not properly handle all components of the Ethernet cards,
especially electronic parts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A technician is installing RAM in a new workstation and needs to protect against
electrostatic discharge. Which of the following will best resolve this concern?
A. Battery backup
B. Thermal paste
C. ESD strap
D. Consistent power

A

C. ESD strap

Explanation:
An ESD (electrostatic discharge) strap is specifically designed to prevent static
electricity from damaging sensitive computer components during installation.

Breakdown of Each Choice:
* A. Battery backup: Protects against power loss, not ESD.
* B. Thermal paste: Used for heat conduction between CPU and cooler, not
related to ESD protection.
* C. ESD strap: Prevents electrostatic discharge, protecting components during
installation.
* D. Consistent power: Ensures stable power supply, but does not address
ESD concerns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In an organization with a standardized set of installed software, a developer submits a request to have new software installed. The company does not currently have a license for this software, but the developer already downloaded the installation file and is requesting that the technician install it. The developer states that the management team approved the business use of this software. Which of the following is the best action for the technician to take?

A. Contact the software vendor to obtain the license for the user, and assist the user with installation once the license is purchased.
B. Run a scan on the downloaded installation file to confirm that it is free of malicious software, install the software, and document the software installation process.
C. Indicate to the developer that formal approval is needed; then, the IT team should investigate the software and the impact it will have on the organization before installing the software.
D. Install the software and run a full system scan with antivirus software to confirm that the operating system is free of malicious software.

A

C. Indicate to the developer that formal approval is needed; then, the IT team should investigate the software and the impact it will have on the organization before installing the software.

Breakdown:
* A. Contact vendor for license and assist installation: Skips formal approval and evaluation.
* B. Scan file, install, and document: Ignores licensing and approval.
* C. Require formal approval and IT evaluation: Ensures proper checks are done.
* D. Install and run antivirus scan: Ignores approval and licensing checks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A company wants to remove information from past users’ hard drives in order to reuse the hard drives. Which of the following is the MOST secure method?

A. Reinstalling Windows
B. Performing a quick format
C. Using disk-wiping software
D. Deleting all files from command-line interface

A

C. Using disk-wiping software

Disk-wiping software securely overwrites all data on the drive, often multiple times, making it irretrievable. This ensures compliance with data security standards for reusing hard drives.

Why Other Options Are Incorrect:
A. Reinstalling Windows:

Only removes the operating system and resets partitions but leaves underlying data intact and potentially recoverable.
B. Performing a quick format:

Resets the file system metadata, but the actual data remains on the drive and can be recovered using forensic tools.
D. Deleting all files from the command-line interface:

Removes file directory entries but does not erase the actual data, leaving it easily recoverable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?

A. End user acceptance
B. Perform risk analysis
C. Communicate to stakeholders
D. Sandbox testing

A

A. End user acceptance

Explanation:
After a change advisory board (CAB) approves a change request, the next step is often end user acceptance to ensure the change meets the needs and expectations of the users before full implementation. This step validates that the change aligns with the desired outcomes.

Why the Other Options Are Incorrect:
B. Perform risk analysis:

Risk analysis occurs earlier in the process, before CAB approval, to assess potential impacts and inform the decision.
C. Communicate to stakeholders:

While communication is important, it typically happens alongside or after end-user acceptance testing, not as the immediate next step.
D. Sandbox testing:

Sandbox testing is performed before CAB approval to validate the technical aspects of the change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A company is issuing smartphone to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?

A. Anti-malware
B. Remote wipe
C. Locator applications
D. Screen lock

A

B. Remote wipe

Explanation:
Remote wipe allows the company to remotely erase all data from the smartphone if it is lost or stolen, ensuring that sensitive information is not exposed. This is the most secure solution for protecting data in the event of a lost or stolen device.

Why the Other Options Are Incorrect:
A. Anti-malware:

While useful for protecting against malicious software, anti-malware does not address the issue of lost or stolen devices.
C. Locator applications:

Locator apps help track the device but do not secure the data in case the device is not recoverable or accessed by an unauthorized party.
D. Screen lock:

A screen lock provides some security but does not ensure data protection if the device is lost and someone manages to bypass the lock.

17
Q

A manager reports that staff members often forget the passwords to their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted?

A. Enable multifactor authentication.
B. Increase the failed log-in threshold.
C. Remove complex password requirements.
D. Implement a single sign-on with biometrics.

A

D. Implement a single sign-on with biometrics

Explanation:
Single sign-on (SSO) with biometrics allows users to authenticate with a single method, like fingerprint or facial recognition, reducing the need to remember multiple passwords and lowering help desk tickets.

Why the Other Options Are Incorrect:
A. Enable multifactor authentication:
Increases security but doesn’t solve the password forgetting issue.
B. Increase the failed log-in threshold:
Doesn’t address forgotten passwords and weakens security.
C. Remove complex password requirements:
Easier to remember but lowers security.

18
Q

A technician is familiar with most personnel at a customer’s location and has clearance to work unsupervised. Which of the following describes how the technician should handle personal communication while on site?
A. Respond to calls and text messages while on site but not when working directly with personnel.
B. Respond to calls and text messages only from family.
C. Respond to calls and text messages only when an emergency situation requires a response.
D. Respond to calls and text messages discreetly while on site.

A

C. Respond to calls and text messages only when an emergency situation requires a response.

Explanation:
The technician should prioritize professionalism and minimize distractions while on-site. Responding to calls or messages only in an emergency ensures that the technician stays focused on the task at hand and maintains a professional demeanor.

Why the Other Options Are Incorrect:
A. Respond to calls and text messages while on site but not when working directly with personnel:
This can lead to interruptions and a lack of professionalism, even when not directly interacting with personnel.
B. Respond to calls and text messages only from family:
Limiting communication to family is overly restrictive and may still create distractions.
D. Respond to calls and text messages discreetly while on site:
While discreet, responding to calls and texts during work hours can still disrupt focus and efficiency.

19
Q

Which of the following helps ensure that a piece of evidence extracted from a PC is admissible in a court of law?
A. Data integrity form
B. Valid operating system license
C. Documentation of an incident
D. Chain of custody.

A

D. Chain of custody.

The chain of custody documents the handling, transfer, and storage of evidence to ensure it is authentic and has not been tampered with. This is critical for evidence to be admissible in court.

Why Others Are Incorrect:
A. Data integrity form: While data integrity is important, it’s not the formal process required for legal admissibility.
B. Valid operating system license: This is unrelated to evidence handling or admissibility.
C. Documentation of an incident: Helpful for record-keeping but does not ensure legal evidence handling like a chain of custody does.

20
Q

During a network outage, a technician discovers a new network switch that was not listed in the support documentation. The switch was installed during a recent change window when a new office was added to the environment. Which of the following would most likely prevent this type of mismatch after next month’s change window?
A. Performing annual network topology reviews
B. Requiring all network changes include updating the network diagrams
C. Allowing network changes once per year
D. Routinely backing up switch configuration files

A

B. Requiring all network changes include updating the network diagrams.

Updating network diagrams during any network change ensures accurate documentation of all devices and their locations. This helps prevent mismatches or confusion during troubleshooting, such as discovering unlisted devices.

Why the other options are incorrect:
A. Performing annual network topology reviews: Annual reviews are too infrequent to address changes made monthly or more often.
C. Allowing network changes once per year: This is impractical for dynamic environments requiring frequent updates.
D. Routinely backing up switch configuration files: Backups protect configurations but do not address mismatched or missing documentation.

21
Q

A technician receives a personal text message while troubleshooting a customer’s PC. The technician does not reply to the message and
continues troubleshooting. Which of the following best describes the technician’s actions?
A. Avoiding distractions
B. Presenting a professional appearance
C. Setting and meeting timelines
D. Projecting confidence

A

A. Avoiding distractions.

By ignoring the personal text message and staying focused on troubleshooting, the technician is avoiding distractions and maintaining attention on the task at hand, which is essential for providing quality service and resolving the issue efficiently.

Why the other options are incorrect:
B. Presenting a professional appearance: While maintaining focus is professional, “appearance” typically refers to physical presentation, such as attire or demeanor.
C. Setting and meeting timelines: This relates to managing schedules and deadlines, not ignoring distractions.
D. Projecting confidence: Confidence involves displaying assurance in one’s abilities, but this action demonstrates focus rather than confidence.

22
Q

A systems administrator is creating a new document with a list of the websites that users are allowed to access. Which of the following types of
documents is the administrator most likely creating?
A. Access control list
B. Acceptable use policy
C. Incident report
D. Standard operating procedure

A

B. Acceptable Use Policy

Explanation:
An Acceptable Use Policy (AUP) outlines the rules and guidelines for using an organization’s resources, such as allowed websites. By listing permissible websites, the administrator is defining acceptable usage for users.

Why the other options are incorrect:
A. Access control list (ACL): An ACL is a technical configuration for controlling access to networks, files, or systems, not a document defining usage rules.
C. Incident report: This is used to document security or operational incidents, not usage guidelines.
D. Standard operating procedure (SOP): An SOP details step-by-step instructions for performing specific tasks, not rules for allowed website access.

23
Q

A company’s assets are scanned annually. Which of the following will most likely help the company gain a holistic view of asset cost?
A. Creating a database
B. Assigning users to assets
C. Inventorying asset tags
D. Updating the procurement account owners

A

A. Creating a Database

Creating a database allows the company to centralize and organize all asset information, including purchase cost, maintenance expenses, depreciation, and other associated costs. This provides a holistic view of asset costs over time.

Why the other options are incorrect:
B. Assigning users to assets: Helps with accountability but does not provide cost-related insights.
C. Inventorying asset tags: Tracks physical assets but focuses on identification, not costs.
D. Updating the procurement account owners: Ensures proper oversight but does not offer a complete view of asset costs.

24
Q

A company is recycling old hard drives and wants to quickly reprovision the drives for reuse. Which of the following data destruction methods should the company use?
A. Degaussing
B. Standard formatting
C. Low-level wiping
D. Deleting

A

B. Standard formatting

Standard formatting is a quick way to prepare a hard drive for reuse by erasing the file system, which makes the data appear gone. It is fast and efficient for reprovisioning drives when data security is not a major concern.

A. Degaussing: This destroys the magnetic data on the drive, making it unusable, so it’s not suitable for reuse.
C. Low-level wiping: This securely overwrites data multiple times, but it’s time-consuming and unnecessary for quick reprovisioning.
D. Deleting: Simply removing files does not actually erase the data; it can still be recovered easily.

25
A large university wants to equip all classrooms with high-denition IP videoconferencing equipment. Which of the following would most likely be impacted in this situation? A. SAN B. LAN C. GPU D. PAN
B. LAN ## Footnote Equipping classrooms with high-definition IP videoconferencing equipment will increase network traffic, requiring the LAN to handle higher bandwidth and low-latency communication. Why others are incorrect: SAN: Handles storage, not networking. GPU: Affects device video rendering, not the network. PAN: Too small-scale for this use case.
26
Maintaining the chain of custody is an important part of the incident response process. Which of the following reasons explains why this is important? A. To maintain an information security policy B. To properly identify the issue C. To control evidence and maintain integrity D. To gather as much information as possible
C. To control evidence and maintain integrity ## Footnote Maintaining the chain of custody ensures evidence is properly handled, stored, and documented to preserve its integrity for legal or forensic use. A. Not specific to evidence handling. B. Focuses on identifying issues, not managing evidence. D. About gathering info, not maintaining evidence integrity.
27
A user is setting up backups on a workstation. The user wants to ensure that the restore process is as simple as possible. Which of the following backup types should the user select? A. Full B. Incremental C. Differential D. Synthetic
A. Full ## Footnote A full backup includes all files and data in a system, making the restore process straightforward because everything needed for a full recovery is in one backup set. No additional backup types (like incremental or differential) are needed for the restore, making it the simplest option Why others are incorrect: B. Incremental: Requires the full backup plus all incremental backups for restore, making it more complex. C. Differential: Requires the full backup and the latest differential, which can become large. D. Synthetic: Combines full and incremental backups, making the restore process more complex.
28
A technician needs to track evidence for a forensic investigation on a Windows computer. Which of the following describes this process? A. Valid license B. Data retention requirements C. Material safety data sheet D. Chain of custody
D. Chain of custody ## Footnote The chain of custody is the documented and unbroken trail showing: Who had access to the evidence When it was collected How it was handled or transferred It is crucial in forensic investigations to ensure the evidence has not been tampered with and is legally admissible in court. ❌ A. Valid license Refers to legal software use — not related to tracking forensic evidence. ❌ B. Data retention requirements These specify how long data must be kept, not how evidence is tracked during an investigation. ❌ C. Material Safety Data Sheet (MSDS) Related to handling chemicals/materials safely, irrelevant to digital forensics.
29
A user wants to acquire antivirus software for a SOHO PC. A technician recommends a licensed software product, but the user does not want to pay for a license. Which of the following license types should the technician recommend? A. Corporate B. Open-source C. Personal D. Enterprise
B. Open-source ## Footnote Open-source software is typically free to use, and the source code is publicly available. Many open-source antivirus tools offer personal use without licensing fees, making it an ideal recommendation for a budget-conscious SOHO (Small Office/Home Office) user. It satisfies the user's request for no cost while still being legitimate software. ❌ A. Corporate Corporate licenses are meant for business environments, often with a cost and bulk-use restrictions. ❌ C. Personal “Personal” licenses may still require payment; it's a usage restriction, not a guarantee of being free. ❌ D. Enterprise Enterprise licenses are for large-scale organizational use and usually involve higher costs and advanced features.
30
A technician needs to upgrade a legacy system running on a 32-bit OS with new applications that can work both on a 32-bit and a 64-bit system. The legacy system is critically important to the organization. The IT manager cautions that the new applications must not have a detrimental effect on company finances. Which of the following impacts is the IT manager most concerned with? A. Device B. Business C. Network D. Operation
B. Business ## Footnote B. Business — The IT manager is worried about the financial impact, which falls under business impact. Any change that negatively affects finances or business operations is a business concern. Why the others are incorrect: ❌ A. Device — Relates to hardware, not finances. ❌ C. Network — Concerns connectivity or traffic, not directly about money. ❌ D. Operation — Refers to day-to-day functioning, but the question highlights financial impact specifically, so business impact is more accurate.
31
Which of the following should be documented to ensure that the change management plan is followed? A. Scope of the change B. Purpose of the change C. Change rollback plan D. Change risk analysis
A. Scope of the change ## Footnote Scope of the change defines what exactly will be changed and sets clear boundaries for the project or task. Documenting the scope ensures everyone understands the limits and objectives, which helps the change management plan be followed properly by preventing scope creep or misunderstandings. Why the other answers are less appropriate: ❌ B. Purpose of the change — Explains why the change is happening but doesn’t control or guide the execution of the plan. ❌ C. Change rollback plan — Important for reversing changes but doesn’t by itself ensure the overall change plan is followed. ❌ D. Change risk analysis — Identifies risks but doesn’t directly control adherence to the change plan.
32
A payroll server has data on it that needs to be readily available and can be recovered quickly if something is accidentally removed. Which of the following backup methods should be used to provide the fastest data recovery in this situation? A. Full B. Differential C. Synthetic D. Incremental
A. Full ## Footnote ✅ A. Full A full backup copies all the data to the backup media. It provides the fastest recovery time because all data is stored in one place—no need to combine multiple backup sets during restoration. This is ideal for a payroll server, where quick, reliable recovery is critical. ❌ Incorrect Options: B. Differential A differential backup stores all changes since the last full backup. It restores faster than incremental (only two backup sets needed: full + latest differential), but still slower than a full backup. C. Synthetic A synthetic backup merges full and incremental backups into one "synthetic full" backup. While efficient for backup speed, restoration can be slower depending on implementation. D. Incremental Backs up only changes since the last backup (full or incremental). Restoration is slowest because it requires the full backup plus all subsequent incremental backups.
33
Which of the following statements describes the purpose of scripting languages? A. To access the hardware of the computer it is running on B. To automate tasks and reduce the amount of manual labor C. To abstract the complexity of the computer system D. To compile the program into an executable file
B. To automate tasks and reduce the amount of manual labor ## Footnote ✅ B. To automate tasks and reduce the amount of manual labor Scripting languages (like Python, Bash, or PowerShell) are primarily used to automate repetitive tasks, such as system maintenance, data manipulation, or software deployment. This helps reduce the time and effort spent on manual work. ❌ Incorrect Options: A. To access the hardware of the computer it is running on Low-level languages like C or Assembly are used for direct hardware access, not scripting languages. C. To abstract the complexity of the computer system While scripting languages offer simplicity, abstraction is more a feature of high-level programming languages generally, not specific to scripting. D. To compile the program into an executable file Scripting languages are usually interpreted, not compiled (though some can be compiled in special cases). Compilation is more typical of languages like C++ or Java.
34
A technician needs to perform after-hours service starting at 10:00 p.m. The technician is currently 20 minutes late. The customer will also be late. Which of the following should the technician do considering proper communication techniques and professionalism? A. Do not notify the customer if arriving before the customer. B. Dismiss the customer and proceed with the after-hours work. C. Contact the customer if the technician is arriving late. D. Disclose the experience via social media
C. Contact the customer if the technician is arriving late. ## Footnote ✅Professionalism and proper communication require notifying the customer if you are going to be late, especially for scheduled service calls—whether during business hours or after hours. ❌ Why the Other Options Are Incorrect: A. Do not notify the customer if arriving before the customer 🔻 Lack of communication can cause confusion and reduce customer satisfaction. B. Dismiss the customer and proceed with the after-hours work 🔻 Disrespectful and unprofessional—never dismiss the customer. D. Disclose the experience via social media 🔻 Violates professional conduct and possibly confidentiality.
35
An organization is creating guidelines for the incorporation of generative AI solutions. In which of the following would these guidelines be published? A. Standard operating procedure B. Acceptable use policy C. Security protocols D. Data flow diagram
B. Acceptable use policy ## Footnote Guidelines for using generative AI solutions typically fall under rules governing how technology and resources can be used responsibly within an organization. These rules are best documented in an Acceptable Use Policy (AUP). ❌ Why the Other Options Are Incorrect: A. Standard operating procedure 🔻 SOPs describe detailed step-by-step processes, not broad usage guidelines or policies. C. Security protocols 🔻 Security protocols focus on technical measures for security, not general usage policies. D. Data flow diagram 🔻 Data flow diagrams visualize how data moves in a system, unrelated to policy documentation.
36
A technician needs to back up a small business’s entire network that includes ten workstations. Which of the following methods should the technician use to safely and securely back up the business’s network? A. Cloud storage B. RAID C. Tape drive D. Local backups
A. Cloud storage ## Footnote ✅ Cloud storage offers safe, secure, off-site backups that protect data against local disasters (fire, theft, hardware failure). It is scalable, easy to manage, and often includes encryption and automated backup options — ideal for a small business network with multiple workstations. Why the other options are less appropriate: B. RAID ❌ RAID is for redundancy and fault tolerance on storage devices but not a backup solution by itself. It doesn’t protect against accidental deletion or ransomware. C. Tape drive ❌ Tape drives are good for large-scale backups but tend to be more expensive and less convenient for small businesses with only ten workstations. D. Local backups ❌ Local backups (e.g., external hard drives) are useful but pose a risk if the backup device is kept onsite — it can be lost or destroyed along with the original data.
37
A user reports being unable to access a sports team’s website on an office computer. The administrator tells the user this blocked access is intentional and based on company guidelines. Which of the following is the administrator referring to? A. NDA B. AUP C. VPN D. SOP
B. AUP (Acceptable Use Policy) ## Footnote ✅ B. AUP (Acceptable Use Policy) An Acceptable Use Policy outlines what users are permitted (and not permitted) to do on a company’s network or systems. Blocking access to non-work-related websites like a sports team’s site is a common rule enforced under an AUP. ❌ Incorrect Options: ❌ A. NDA (Non-Disclosure Agreement) An NDA is a legal contract that prevents sharing confidential information. It does not govern internet access or usage policies. ❌ C. VPN (Virtual Private Network) A VPN secures internet traffic and can bypass geographic or network restrictions, but it’s not a policy or guideline—it’s a tool. ❌ D. SOP (Standard Operating Procedure) An SOP outlines specific procedures for routine tasks, not policies for acceptable behavior or internet use.
38
A customer calls a service support center and begins yelling at a technician about a feature for a product that is not working to the customer's satisfaction. This feature is not supported by the service support center and requires a field technician to troubleshoot. The customer continues to demand service. Which of the following is the BEST course of action for the support center representative to take? A. Inform the customer that the issue is not within the scope of this department. B. Apologize to the customer and escalate the issue to a manager. C. Ask the customer to explain the issue and then try to fix it independently. D. Respond that the issue is something the customer should be able to fix.
B. Apologize to the customer and escalate the issue to a manager. ## Footnote ✅This is the most professional and empathetic response. Since the issue is outside the support center’s scope and the customer is upset, escalating to a manager ensures the concern is handled appropriately. ❌ A. Just stating it’s out of scope sounds dismissive and may escalate frustration. ❌ C. Trying to fix something outside your role wastes time and can cause confusion. ❌ D. Telling the customer they should fix it is unprofessional and disrespectful.