Troubleshooting, Data, Business Flashcards

Objectives 1 and 6

1
Q

Which of the following business continuity concepts is the best example of fault tolerance?

A. Data restoration

B. Redundant power

C. Disaster recovery

D. Restoring access

A

B. Redundant Power

Redundant power is a business continuity concept that exemplifies fault tolerance. It involves the use of backup power sources, such as uninterruptible power supplies (UPS) or backup generators, to ensure continuous power supply to critical systems and infrastructure in the event of a power outage or failure.

A. Data restoration: This is about recovering lost data from backups, not about preventing failures or ensuring continuous operation.

C. Disaster recovery: This focuses on restoring systems after an event like a disaster, but it doesn’t deal with fault tolerance, which prevents interruptions.

D. Restoring access: This involves regaining access to systems after an outage, but it doesn’t ensure continuous operation like fault tolerance does.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A technician has received multiple reports about a media player, which is located in a waiting room, turning on and off at various times of the day. The technician replaces the power adapter and turns the player back on. Which of the following should the technician do next?

A. Verify there is full system functionality.

B. Document the findings/lessons learned.

C. Implement the solution.

D. Research the knowledge base.

A

A. Verify there is full system functionality.

After replacing the power adapter, the technician needs to ensure the media player is working correctly by monitoring it for a while. This ensures the problem is fixed and avoids future disruptions.

B. Document the findings/lessons learned: Documentation is important but should be done after confirming that the media player is functioning properly.

C. Implement the solution: The solution (replacing the power adapter) has already been applied, but the technician must confirm it works before finalizing.

D. Research the knowledge base: This step is useful before applying a solution. Since the adapter has already been replaced, the focus should now be on verifying the fix.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A technician has verified full system functionality. Which of the following actions should the technician take next?

A. Question the users.

B. Determine if anything has changed.

C. Document the findings.

D. Gather information.

A

C. Document the findings

After verifying that the system is functioning properly, the next step is to document the findings. This ensures a clear record of what was done, how the issue was resolved, and the system’s current status. It’s useful for future troubleshooting and for communicating with others.

A. Question the users: This might be helpful in gathering more information, but it’s not the immediate next step after confirming system functionality.

B. Determine if anything has changed: Checking for changes is important, but documentation comes first to record what was fixed.

D. Gather information: While gathering information is part of troubleshooting, documenting the findings should be prioritized once functionality is verified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A company developed a new logo and wants to ensure no one else uses it, in order to prevent brand confusion. Which of the following will the company most likely seek?

A. Copyright

B. Patent

C. Watermark

D. Trademark

A

D. Trademark

new logo

To protect a new logo and prevent others from using it, a company should seek trademark protection. A trademark covers symbols, names, and logos that identify and distinguish a company’s goods or services.

A. Copyright: Protects original works like art and literature, not typically used for logos, although parts of a logo may be copyrightable.

B. Patent: Protects inventions and technical processes, not logos or brand identifiers.

C. Watermark: Used to mark digital images for ownership but not suitable for protecting logos in terms of trademark infringement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following can a company use to protect its logo?

A. Trademark

B. Copyright

C. Domain name

D. Patent

A

A. Trademark

logo = trademark

A company protects its logo by registering it as a trademark. This form of intellectual property safeguards symbols, names, and logos that distinguish its products or services, granting exclusive rights to use the logo and preventing others from causing confusion with similar logos.

B. Copyright: Protects original works like art and literature but isn’t typically used for logos. Logos are better protected through trademarks.

C. Domain name: This is used for website addresses and doesn’t protect logos. However, a trademarked logo can be used in a domain name for branding.

D. Patent: Protects inventions and processes, not logos. Patents are for technical innovations, not brand identifiers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The process of determining the source of an issue during troubleshooting is called:

A. researching.

B. sourcing.

C. diagnosing.

D. triaging.

A

C. Diagnosing

think doctors office visit

This is the process of identifying the source or cause of an issue by analyzing symptoms and gathering relevant information. It’s a key step in troubleshooting to understand and resolve problems.

A. Researching: Involves gathering information on a topic but doesn’t specifically focus on identifying the root cause of an issue.

B. Sourcing: Refers to obtaining goods or services from external suppliers, not related to identifying issues.

D. Triaging: Involves prioritizing issues based on severity or urgency rather than determining their source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is used to protect intellectual property while requiring the owner to provide the public with working details?

A. Patent

B. Trademark

C. License

D. Copyright

A

A. Patent

A patent provides exclusive rights to an invention for up to 20 years, requiring the owner to disclose the invention’s details to the public. This allows others to learn from the invention while preventing unauthorized use.

B. Trademark: Protects symbols, words, or designs that identify the source of goods or services, without requiring public disclosure of the product’s details.

C. License: Grants permission to use intellectual property under certain conditions but doesn’t require public disclosure of the intellectual property details.

D. Copyright: Protects original works of authorship and prevents unauthorized use, without requiring the owner to disclose working details of the work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is used to define what employees can do on company IT resources?

A. Standard operating procedures

B. IT security manual

C. Service-level agreement

D. Acceptable use policy

A

D. Acceptable use policy

Acceptable Use Policy (AUP): Rules that tell employees what they can and can’t do with the company’s IT resources, like computers and the internet. It helps keep things secure and ensures employees follow the right practices.

A. Standard Operating Procedures (SOPs): Step-by-step instructions for regular tasks within a company. While they may include IT processes, they don’t focus on what employees are allowed to do on company IT systems.

B. IT Security Manual: A guide on how to keep IT systems and data safe, including security rules and measures. It may touch on acceptable use, but its main focus is protecting IT assets.

C. Service-Level Agreement (SLA): A contract between a service provider and a customer that defines the expected quality and performance of a service. It doesn’t deal with employee behavior on IT resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A user is having issues trying to reach a website. The technician asks questions of the user and then tries to open the same website on another device. Which of the following troubleshooting steps is the technician performing?

A. Gathering information

B. Establishing a plan of action

C. Finding the root cause

D. Duplicating the problem

A

D. Duplicating the problem

Duplicating the problem because the technician is testing the issue on another device to confirm whether it’s isolated to the user’s device or more widespread. This helps verify the problem’s existence and scope.

A. Gathering information: This step is about collecting details about the issue, but in this case, the technician has already gathered the information from the user.

B. Establishing a plan of action: This is the step where the technician plans how to fix the problem, which comes after identifyingand confirming the issue.

C. Finding the root cause: Before determining the root cause, the technician needs to confirm the problem by duplicating it, which is what they are doing in this scenario.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following actions would a technician MOST likely perform FIRST when troubleshooting an issue?

A. Research errors that are known to result in the issue.

B. Gather information to clarify and duplicate the symptom.

C. Apply known solutions that address the symptom.

D. Systematically evaluate common causes of the issue.

A

B. Gather information to clarify and duplicate the symptom

Gather information to clarify and duplicate the symptom because gathering details about the problem (like error messages or specific symptoms) is crucial for understanding and replicating the issue, which is the first step in troubleshooting.

A. Research errors that are known to result in the issue: This step comes after you have gathered information about the specific symptoms. Without this info, your research may not be relevant.

C. Apply known solutions that address the symptom: Solutions should only be applied after thoroughly understanding the issue through information gathering. Jumping ahead can lead to incorrect fixes.

D. Systematically evaluate common causes of the issue: This step comes after gathering information. You need to know the specifics of the problem before you can evaluate potential causes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is the BEST approach when troubleshooting an issue and questioning a user?

A. Administratively take control of the customer’s system to determine the underlying issue.

B. Inform the customer about the things the customer did to cause the issue.

C. Quickly identity the issue and tell the customer immediately what to do.

D. Ask clarifying questions and actively listen to the answers without interrupting.

A

D. Ask clarifying questions and actively listen to the answers without interrupting.

The correct approach is asking clarifying questions and actively listening to the answers without interrupting. This allows the technician to fully understand the problem, the user’s perspective, and any relevant details, which helps in finding the right solution while also building a good rapport with the user.

A. Administratively take control of the customer’s system to determine the underlying issue: This can feel invasive, and users might be uncomfortable. It’s important to ask for permission before accessing their system and to avoid taking control too quickly.

B. Inform the customer about the things the customer did to cause the issue: Blaming the user can lead to a negative experience. The focus should be on understanding the problem and helping, not assigning blame.

C. Quickly identify the issue and tell the customer immediately what to do: Rushing to conclusions without gathering enough information can result in misdiagnosis or an ineffective solution. It’s better to take the time to fully understand the problem before offering guidance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Protection of a computer manufacturer’s laptop design would be considered an example of a:

A. patent.

B. watermark.

C. copyright.

D. trademark.

A

A. Patent

The correct protection for a computer manufacturer’s laptop design is a patent, as patents provide exclusive rights to new inventions, including unique designs or features of physical products like laptops.

B. Watermark: A watermark is used to protect digital content, like images or documents, by embedding ownership information. It is not used for physical products like a laptop.

C. Copyright: Copyright protects creative works like books, music, and software, but it does not cover physical designs of products like laptops, although it might protect things like user manuals or packaging art.

D. Trademark: Trademarks protect brand identifiers, such as logos or slogans. While a laptop manufacturer may have a trademark for their logo or name, it doesn’t cover the physical design of the laptop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following would be the MOST secure method to communicate information to a supervisor regarding a project’s status?

A. Project distribution list

B. Personal email

C. Company-provided instant messaging system

D. Text message

A

C. Company-provided instant messaging system

Company-provided instant messaging system because it offers secure communication with features like encryption and IT oversight, making it ideal for sharing sensitive project information with a supervisor.

A. Project distribution list: While convenient, emails sent to a group may not have the same level of encryption or security controls, increasing the risk of unauthorized access.

B. Personal email: Personal email accounts lack the security measures that company systems have, like encryption and monitoring, making them a risky option for sensitive work communication.

D. Text message: Texts are typically sent over unencrypted channels, meaning they can be intercepted or accessed by unauthorized individuals, making them less secure for sharing confidential project details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is an example of encrypted data in transit?

A. Encrypting a drive partition

B. Accessing a banking website

C. Compressing a file with a password

D. Validating a download with a checksum

A

B. Accessing a banking website

Accessing a banking website because it involves encrypted data in transit through HTTPS, which ensures sensitive data like login credentials and account information are protected from interception during transmission over the internet.

A. Encrypting a drive partition: This encrypts data stored on a physical drive (data at rest), not data being transmitted over a network.

C. Compressing a file with a password: This protects the file’s contents but relates to data at rest, not data moving across a network.

D. Validating a download with a checksum: This checks file integrity after transmission, but it doesn’t encrypt the data during transmission, so it’s not an example of encrypted data in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following explains the key difference between an EULA and terms and conditions?

A. Terms and conditions clarify what services a company agrees to offer the user.

B. Terms and conditions are not legally binding.

C. An EULA can only be accepted by an attorney.

D. An EULA, upon acceptance, grants the user full copyright to the product and/or service.

A

A. Terms and conditions clarify what services a company agrees to offer the user.

An End-User License Agreement (EULA) specifically governs the use of software or digital products, outlining licensing terms, usage restrictions, and rights.

A. Terms and conditions are not legally binding: This is incorrect. Terms and conditions are legally binding once a user agrees to them, regulating the use of products or services.

C. An EULA can only be accepted by an attorney: This is incorrect. Any user can accept an EULA when installing or using software; no legal representative is required.

D. An EULA grants the user full copyright to the product: This is incorrect. An EULA grants a license to use the software but does not transfer ownership or copyright to the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A user’s mouse appears to be jumping around the screen. Which of the following will MOST likely to fix the issue?

A. Update the drivers.

B. Clean the mouse.

C. Use a different USB port.

D. Restart the computer.

A

B. Clean the mouse

Clean the mouse because dirt or debris on the sensor or tracking surface of the mouse is a common cause of the cursor jumping around. Cleaning it with compressed air or a soft cloth usually fixes this issue.

A. Update the drivers: While driver updates can fix software-related issues, they are less likely to resolve cursor jumping caused by dirt on the mouse sensor.

C. Use a different USB port: Changing the port may help if the issue is due to a faulty connection, but it’s not relevant if the problem is due to dirt on the mouse’s sensor.

D. Restart the computer: Restarting may fix temporary software issues, but it won’t address physical issues like dirt affecting the mouse sensor.

17
Q

After implementing a solution, which of the following should a technician do NEXT?

A. Verify system functionality.

B. Document the findings.

C. Determine if anything has changed.

D. Establish a new theory.

A

A. Verify system functionality

Verify system functionality because after applying a solution, the technician needs to ensure the system is working correctly and that the problem is fully resolved. This step confirms the effectiveness of the fix before closing the issue.

B. Document the findings: While documenting is important, it usually happens throughout the process and after confirming that the issue is fully resolved.

C. Determine if anything has changed: This is an important step earlier in troubleshooting to understand the problem, but after applying a fix, the focus should be on testing the system to ensure the solution worked.

D. Establish a new theory: You would only establish a new theory if the issue is not resolved. After applying a fix, the priority is verifying functionality before considering new theories.

18
Q

Which of the following is part of when troubleshooting an issue?

A. Spotting symptoms

B. Determining if anything has changed

C. Testing the theory

D. Duplicating the problem

E. Gathering information

A

E. Gathering Information

Gathering information because this step is crucial for understanding the issue’s context, symptoms, and relevant factors that contribute to identifying a solution. By gathering detailed information, technicians can assess the problem more accurately and determine possible fixes.

A. Spotting symptoms: This is part of the initial problem identification phase, helping to recognize the issue, but it’s not the step where the solution is found.

B. Determining if anything has changed: This helps identify factors that might have triggered the problem, but it is more about understanding the context rather than finding the solution.

C. Testing the theory: This step happens after gathering information and proposing a solution to see if it resolves the issue, but it’s not where the solution is first identified.

D. Duplicating the problem: Duplicating the issue helps understand it better, but this comes after information gathering and doesn’t directly identify the solution.

19
Q

Which of the following should a software developer use to BEST prevent unauthorized reproduction of software?

A. Watermark

B. Copyright

C. Patent

D. Trademark

A

B. Copyright

Copyright because copyright protection is specifically designed to prevent unauthorized reproduction of creative works, including software. It grants the developer exclusive rights to copy, distribute, and modify the software, helping protect against unauthorized use.

A. Watermark: A watermark can indicate ownership of digital content but is not sufficient for preventing unauthorized copying or reproduction of software code.

C. Patent: While patents protect inventions and processes, they are less commonly used for software reproduction, focusing more on unique, innovative software methods or algorithms.

D. Trademark: Trademarks protect logos, brand names, or slogans, but they do not cover the actual software code or its reproduction. They focus on brand identity rather than software functionality.

20
Q

A non-profit organization obtains images from the internet to use on a website. Which of the following is the organization possibly infringing on?

A. Copyright

B. Patent

C. Trademark

D. DRM

A

A. Copyright

Copyright because copyright protection is specifically designed to safeguard original works like images. If a non-profit organization uses images from the internet without proper authorization or checking licensing terms, they may be infringing on the copyright of the original creators.

B. Patent: Patents protect inventions or processes, not images or visual content. They are unrelated to issues of unauthorized use of images.

C. Trademark: Trademarks are about protecting brand identifiers like logos or slogans, not the images themselves. Trademark infringement involves using confusingly similar marks, not unauthorized use of images.

D. DRM (Digital Rights Management): DRM technologies are used to control access and usage of digital content. While DRM helps protect copyrighted material, the issue described is about infringement, not DRM protection or circumvention.

21
Q

Data contained on which of the following would have the HIGHEST expectation of privacy?

A. Mobile

B. Laptop

C. Cloud

D. Workstation

A

B. Laptop

Laptop because laptops, which are often carried by individuals and used in various locations, typically have a higher expectation of privacy. Users usually have control over their physical security and can implement security measures like passwords and encryption to protect the data stored on their laptops.

C. Workstation: While workstations can be secure, they are often left unattended in shared environments (like offices), which may lower the expectation of privacy compared to laptops.

A. Mobile: Mobile devices are prone to loss or theft, which can compromise the privacy of data. Even though users may carry them frequently, their portability increases the risk of unauthorized access.

C. Cloud: Cloud data privacy depends on the provider’s security measures and encryption. Despite robust protections, there are inherent risks, such as data being stored on shared servers or being subject to legal disclosures, which can affect privacy expectations.

22
Q

Which of the following would provide the BEST means of preventing data loss in the event of a disaster?

A. Drive redundancy

B. Off-site storage

C. Backup generator

D. File history

A

B. Off-site storage

Off-site storage because storing data and backups at a separate location ensures that the data is protected even if the primary site experiences a disaster. This separation helps in disaster recovery and reduces the risk of data loss.

A. Drive redundancy: While RAID and other redundancy techniques protect against drive failures, they do not safeguard against disasters that affect the entire system or data center.

C. Backup generator: Backup generators maintain power during outages but do not protect against data loss due to physical damage or destruction of the data storage infrastructure.

D. File history: File history helps with recovering previous versions of files but doesn’t address the risk of comprehensive data loss in the event of a disaster affecting the whole data infrastructure.

23
Q

A user sends a message to a family member via a public instant messaging application. Which of the following BEST describes how long the message will remain on the application’s servers?

a. No less than one day from sending

b. Only until read by the family member

c. As described in the terms of use

d. No more than 30 days from sending

A

C. As described in the terms of use

As described in the terms of use because the duration for which messages are retained on an application’s servers is governed by the application’s terms of use or privacy policy. These documents specify how long messages will be stored before being deleted.

A. No less than one day from sending: The retention period is not universally set to a minimum of one day. It varies based on the application’s specific policies.

B. Only until read by the family member: This is not a common practice for all instant messaging applications. The retention of messages often depends on broader policies rather than being tied to whether they have been read.

D. No more than 30 days from sending: While some applications might have a 30-day retention policy, this is not a universal standard and can differ based on the application’s specific terms of use or privacy policies.

24
Q

A technician is troubleshooting an error message and tests the same program on a separate, identical machine. Which of the following troubleshooting methodology steps is this an example of?

A. Duplicate the problem
B. Gather information
C. Question users
D. Divide and conquer

A

A. Duplicate the problem

Duplicating the problem: involves reproducing the issue on another system or environment to confirm whether it is a systemic issue or specific to the original environment. By testing the program on a separate, identical machine, the technician is essentially duplicating the problem to determine if it is consistent across different setups.

B. Gather information: This step involves collecting data, symptoms, and other relevant information about the problem, rather than actively reproducing it.

C. Question users: This step involves communicating with users to gather details about the issue, which is different from duplicating the problem by testing on another machine.

D. Divide and conquer: This troubleshooting approach involves breaking down the problem into smaller parts to isolate the root cause. Testing the program on another machine is not an example of this method; instead, it aligns with duplicating the problem to confirm its consistency.

25
Q

A user is getting an error messsage when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Whichof the following troubleshooting steps is the technician using by browsing to the same site?

A. Establish a plan of action

B. Gather information

C. Duplicate the problem

D. Find the root cause

A

C. Duplicate the problem

By browsing to the same site locally, the technician is trying to replicate the issue the user is experiencing. This helps to confirm whether the problem is specific to the user’s device or if it is a broader issue affecting multiple devices. Duplicating the problem allows the technician to observe and understand the issue firsthand, which is essential for effective troubleshooting.

A. Establish a plan of action: This involves creating a strategy for resolving the problem, which comes after understanding the issue, not while replicating it.

B.Gather information: While asking questions and collecting details is crucial, the action of browsing to the site is more about replicating the issue rather than just gathering information.

D. Find the root cause: Identifying the root cause comes after confirming and understanding the problem. Replicating the problem helps in diagnosing but is not directly about finding the root cause.

26
Q

A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do first?

A. Check knowledge base

B. Search local logs

C. Research possible theories

D. Question users

A

A. Check knowledge base

The knowledge base is typically a repository of documented issues and solutions that other colleagues may have encountered and resolved. Checking the knowledge base first can provide information on whether the issue has been previously documented, along with potential solutions or troubleshooting steps that have already been tested.

B. Search local logs: This involves looking at system logs to find details about the issue, which is more about diagnosing the problem rather than finding if it has been encountered before.

C. Research possible theories: This involves brainstorming potential causes and solutions for the issue, which comes after checking if the issue has been previously documented.

D. Question users: This step involves asking users about their experience with the issue. While it’s important, it is not the first step in determining if the issue has been previously encountered by colleagues.

27
Q

A Software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?

A. Patent

B. Trademark

C. Watermark

D. Copyright

A

D. Copyright

Copyright provides legal protection to original works of authorship, including written documents like the step-by-step instructions for software. It grants the creator exclusive rights to reproduce, distribute, and publicly display the work, thereby preventing others from publishing or using it without permission.

A. Patent: Patents protect inventions and processes, not written documents. They would be used for protecting the software’s underlying technology or methods, not the instructional document.

B. Trademark: Trademarks protect brands, logos, and symbols that distinguish goods or services. They do not apply to written documents or their content.

C. Watermark: A watermark is a visible or invisible mark used to indicate ownership or authenticity. While it can deter unauthorized use, it does not provide legal protection like copyright does.

28
Q

What would be the most cost effective way to prevent a network from being “lost, damaged, destroyed, inaccessible”?

A. Create a disaster plan

B. Service the network periodically

C. Establish an offsite system backup

D. Purchase redundant hardware

A

C. Establish an offsite system backup

Offsite backups are a cost-effective solution for data protection and disaster recovery. They ensure that even if the primary network is damaged or destroyed, the data can be restored from a backup located at a different site. This approach provides a safety net for recovering from a wide range of potential issues without the need for expensive hardware.

A. Create a disaster plan: While essential for overall preparedness, a disaster plan alone does not prevent network issues; it provides a strategy for response. It does not directly protect data or infrastructure.

B. Service the network periodically: Regular maintenance is important for network health, but it doesn’t fully protect against catastrophic failures or data loss. It helps prevent issues but doesn’t serve as a comprehensive protection measure.

D. Purchase redundant hardware: While redundant hardware can improve network reliability and availability, it can be expensive. Offsite backups can be more cost-effective for preventing data loss and ensuring recoverability without the high costs associated with redundant hardware.

29
Q

What would you do next after fixing the problem?

A. Identify the problem

B. Establish a theory

C. Document findings and solution

A

C. Document findings and solution

After establishing a plan of action and implementing the solution, we’d want to ensure that we verify full system functionality and then document the findings. Go with the most correct answer!

30
Q

Your computer has been running backups for a year. Today, you make a change from backing it up to an external optical drive to backing it up to the cloud. What should you do next?

A. Secure the cloud backup location.

B. Schedule regular cloud backups.

C. Destroy the old optical discs.

D. Verify that the cloud backup works.

A

D. Verify that the cloud backup works

Ensure that the backup to the cloud is functioning correctly and that you can restore data from it if needed. This confirms that the new backup method is effective.

A. Secure the cloud backup location: While important, this should be done alongside or as part of setting up the cloud backup, not as the immediate next step after switching methods.

B. Schedule regular cloud backups: Scheduling backups is crucial but is usually part of the setup process. The immediate next step should be to verify that the backups are actually working.

C. Destroy the old optical discs: This step should only be done after you’ve confirmed that the cloud backup is working correctly and you have verified that your data is secure and accessible.

31
Q

You are troubleshooting a computer problem. After testing the solution, what should you do next?

A. Establish a plan of action.

B. Verify functionality.

C. Document the work.

D. Identify the problem.

A

A. Establish a plan of action

The solution might have worked, and it might not have. Based on if it appeared to or not, you should establish a further plan of action. If it worked, you can move on to verifying full functionality. If not, you may need to go back to trying additional solutions.

32
Q

When providing computer support and testing solutions, what should you always do first?

A. Assume user error.

B. Test the simple stuff.

C. Check Internet resources for solutions.

D. Establish a plan of action.

A

B. Test the simple stuff

Start with the most straightforward solutions before diving into more complex troubleshooting steps. Simple issues are often the cause of the problem, and addressing them first can save time and effort.

A. Assume user error: Assumptions should be avoided. It’s better to gather information and understand the issue before jumping to conclusions.

C. Check Internet resources for solutions: While useful, checking online resources should come after you’ve tested simple solutions and gathered relevant information.

D. Establish a plan of action: Planning is important, but testing simple solutions is a more immediate first step in troubleshooting.

33
Q

When troubleshooting a computer problem, which of the following are steps you can take to identify the problem? (Choose two.)

A. Use external resources such as the Internet.

B. Talk to end users.

C. Isolate the issue.

D. Attribute it to user error.

A

B. Talk to end users
C. Isolate the issue

Talk to end users: Gather information directly from the users experiencing the problem to understand their observations and the symptoms of the issue. Isolate the issue: Narrow down the scope of the problem by determining if it is specific to a certain component or system area. This helps in identifying the root cause of the problem.

A. Use external resources such as the Internet: While useful for finding solutions, using external resources comes after initial identification steps to gather more detailed information.

D. Attribute it to user error: This step is a potential conclusion rather than an identification step. It should be considered only after thoroughly investigating the issue.

34
Q

What option can you configure on your workstation to increase security when you leave your desk?

A. File encryption

B. Multifactor authentication

C. Single sign-on

D. Screensaver password

A

D. Screensaver password

Ctrl+Alt+Del when you leave your seat