Test Out Unit 2 Technician Responsibilities 2.1.6 - 2.9.5

¡Supera tus tareas y exámenes ahora con Quizwiz!

A technician is troubleshooting a computer that doesn't start up correctly. Which of the following could the technician use to troubleshoot the computer? 1. Loopback plug 2. Known good spares 3. 3-prong parts retriever 4. Tone generator and probe

2. Known good spares

To prevent ESD when replacing internal computer components, you attach an anti-static wrist strap to your wrist. Where should the other end be fastened? (Select two.) 1. Ground wire on the wall power outlet 2. Screw on the wall power outlet 3. Metal area on the computer case 4. Anti-static mat 5. Ground wire on the power supply

3. Metal area on the computer case 4. Anti-static mat

Which of the following is a web-browser based operating system? 1. macOS 2. Windows 3. Linux 4. Chrome OS

4. Chrome OS

Which of the following are common tools used to physically clean the inside of a computer? (Select two.) 1. Compressed air 2. Industrial degreaser 3. Damp rag 4. Wire brush 5. Natural bristle brush

1. Compressed air 5. Natural bristle brush

Who needs to approve a change before it is initiated? (Select two.) 1. Change board 2. Sales rep 3. Marketing director 4. Customer 5. Regional rep

1. Change board 4. Customer

Which of the following operating systems was derived from Linux? 1. Chrome OS 2. macOS 3. Unix 4. Windows

1. Chrome OS

You work for a store that sells and repairs computers. Due to the room's layout, while repairing computers, you must walk from one side of the carpeted room to the other frequently. Which of the following would BEST protect you from static electricity buildup? 1. ESD wrist strap 2. ESD heel strap 3. Self-grounding 4. ESD mat

1. ESD wrist strap.

Which of the following Windows 11 Enterprise edition versions is specifically intended for organizations that want to use cloud-delivered endpoint security? 1. Enterprise E5 2. Enterprise E3 3. Enterprise 4. Enterprise E3 in Microsoft 365 E3

1. Enterprise E5

Which of the following is designed to provide a Linux command line interface? 1. Bash 2. GCC 3. GPL 4. GIMP

1. Bash

While it takes 3,000 volts or more of ESD before you can feel it, it takes very little ESD to damage a computer component. What is the minimum ESD volt discharge that can actually damage a component? 1. 100 volts 2. 500 volts 3. 50 volts 4. 10 volts

1. 100 volts.

Most operating systems have a GUI as part of their system. Which of the following BEST describes an operating system's GUI? 1. A user-friendly interface that uses icons and visual components to interact with the system. 2. An important component of a computer that is used to store data and machine code while in use. 3. The primary component of a computer that retrieves, processes, and executes instructions. 4. The microprocessor's program that starts the system up after the computer is powered on.

1. A user-friendly interface that uses icons and visual components to interact with the system.

Which part of the change management process specifies how you will return affected systems to their original state if your implementation fails? 1. Backout plan 2. Risk analysis 3. Scope 4. Purpose

1. Backout plan

Your company provides testing services that help customers identify and resolve performance issues with their software and e-commerce sites before they go live. To perform accurate testing, a large number of computers are required, sometimes numbering in the hundreds. Recently, you have noticed that the lights in the testing lab seem dimmer than normal and sometimes flicker. Which of the following electrical terms BEST describes the condition you are most likely experiencing? 1. Brownout 2. Blackout 3. Power spike 4. Power surge

1. Brownout

Which of the following devices can store large amounts of electricity, even when unplugged? 1. Hard disk drive 2. CRT monitor 3. LCD monitor 4. DVD optical drive

1. CRT monitor.

Which of the following are features of the Windows taskbar component? (Select two.) 1. Can be moved to the left or left-centered on the screen. 2. Includes a search field for quick location of applications. 3. Can be hidden. 4. Provides options to personalize your news feed and interests. 5. Displays breadcrumb navigation when accessing components.

1. Can be moved to the left or left-centered on the screen. 3. Can be hidden.

You plan on including Employee Education and Awareness Policy training for all new employees. As part of that training, which of the following should you instruct your employees NOT to do as part of company procedures? (Select three.) 1. Connect unauthorized devices. 2. Respond to social engineering attacks. 3. Click on links in a phishing email. 4. Become familiar with the company Security Policy. 5. Access restricted areas in the company building. 6. Install software on their company laptops. 7. Bring your own devices to work.

1. Connect unauthorized devices. 2. Respond to social engineering attacks. 3. Click on links in a phishing email.

You suspect that the power supply in your desktop PC is failing. You want to use a multimeter to test the power supply. Which multimeter setting should you use? 1. DC volts 2. Ohms 3. AC volts 4. Watts

1. DC volts

Timothy works in the graphic arts departments and has received approval to upgrade his video card. The card has arrived, and you are ready to begin the upgrade by replacing the old video card with the new one in his workstation. To ensure your personal safety, which of the following should you do FIRST? 1. Disconnect power. 2. Place the computer on an ESD mat. 3. Remove jewelry. 4. Put on safety glasses.

1. Disconnect power.

A user reports that the projector in the conference room has display issues when it is connected to his laptop. After identifying the cause and completely resolving the issue, the projector displays the images perfectly both on his laptop and on the projector. Which of the following troubleshooting strategies should you perform next? 1. Document the solution. 2. Identify the problem. 3. Test the solution. 4. Establish what has changed.

1. Document the solution.

To improve the safety of your location and comply with regulations regarding work environments with hazardous materials, you have been assigned to assemble Material Safety Data Sheets (MSDS) for all chemicals used in your shop. How should you obtain these documents? 1. Download them from the chemical manufacturer's websites. 2. Get them from your local workers' safety insurance office. 3. Ask your manager for them. 4. Write them yourself after researching the issues.

1. Download them from the chemical manufacturer's website.

A user asks you to perform a task that you do not know how to do and is not in the scope of your job duties. What is the BEST way to respond to this situation? 1. Explain to the user that this is not a task you can perform, but you will do your best to contact someone who can perform the task. 2. Tell the user that they will need to find someone else to take care of their problem. 3. Tell the user it isn't in your job description and move on with your current task. 4. Try to perform the task by yourself.

1. Explain to the user that this is not a task you can perform, but you will do your best to contact someone who can perform the task.

Your organization has expanded into an adjacent office. You have been tasked with laying cables to connect the new space with the existing space. Which document should you look at to ensure that there will be no interference or damage to the cables from existing infrastructure? 1. Floor plan 2. Physical security diagram 3. Knowledge base 4. Network topology diagram

1. Floor plan

There are several cloud computing options available for Linux. Drag the cloud computing option on the left to its appropriate description on the right. 1. Provides access to software and data through the cloud. 2 Provides access to storage devices through the cloud. 3. Provides network connectivity through the cloud. 4. Provides access to virtual machines through a network connection. IaaS SaaS NaaS STaaS

1. IaaS 2. SaaS 3. NaaS 4. STaaS

Part of the operating system core is responsible for controlling security, managing the file system, and providing a platform for applications to run on. What is the name of this core component? 1. Kernel 2. Desktop 3. Central Processing Unit 4. Interface 5. Driver

1. Kernel

Your workstation is unable to communicate with any other computer on the network. Which of the following tools should you use to test the network card's abilities to send and receive signals? 1. Loopback plug 2. Multimeter 3. ping command 4. Cable tester

1. Loopback plug

Which of the following features should you look for when selecting a vacuum cleaner for your cleaning kit? 1. Non-static generation 2. Coarse grade bag 3. Washable filters 4. Static induction motor

1. Non-static generation

Arrange the standard change order form information on the left in its standard presentation order on the right. (Not every answer will be used.) 1. Purpose of the change 2. Scope of the change 3. Risk analysis 4. Backout plan

1. Purpose of the change 2. Scope of the change 3. Risk analysis 4. Backout plan

Which documents are generally finished and approved before a project begins? (Select three.) 1. Risk Assessment 2. Slide presentation 3. Budget 4. Customer acceptance checklist 5. Project plan 6. Change order form 7. Analysis spreadsheet

1. Risk Assessment 3. Budget 5. Project plan

A user reports that he is unable to access data on an external hard drive. You investigate the problem and determine that the USB cable connection to the hard drive is damaged. You replace the cable. Which of the following actions should you take next? 1. Test the solution. 2. Determine if escalation is necessary. 3. Create an action plan. 4. Document the problem and solution.

1. Test the solution.

Which of the following best describes the GNU General Public License (GPL) that is associated with the Linux kernel source code? 1. The Linux source code remains freely available to anybody who wants it. 2. You need to pay a yearly fee to access and change the Linux source code. 3. You can freely utilize, but not change, the Linux source code. 4. The Linux source code remains free to those who use it for non-commercial applications.

1. The Linux source code remains freely available to anybody who wants it.

You want to perform an upgrade from Windows 10 to Windows 11 on your laptop computer without going directly to a website or external source to retrieve or access the upgrade package. Which of the following should you use? 1. Updates and Security 2. SCCM 3. Installation Assistant 4. ISO Installation Media

1. Updates and Security

Jeannette's workstation is overheating. She decides to open the workstation and clean any accumulated dust to see if it helps with the overheating issue. Which of the following can Jeannette safely do to remove dust? (Select two.) 1. Use short bursts of compressed air to clean delicate components. 2. Use a lint-free cloth and cleaning solvent to remove all dust accumulation. 3. Remove the power supply to do detailed cleaning. 4. Use a continuous stream of compressed air to clean all components. 5. Use a special vacuum to clean dust from all hardware components.

1. Use a short bursts of compressed air to clean delicate components. 5. Use a special vacuum to clean dust from all hardware components.

Which of the following are most helpful in keeping a computer cool? (Select two.) 1. Vacuum dust from the system regularly. 2. Install a thermostat in the fan circuit. 3. Use a high-wattage power supply. 4. Remove the slot cover from the back of the computer. 5. Verify that cooling fans are not circulating air in the wrong direction.

1. Vacuum dust from the system regularly. 5. Verify that cooling fans are not circulating air in the wrong direction.

Which of the following Windows desktop components lets you create multiple desktop to organize availability for different sets of applications? 1. Virtual desktop 2. Settings 3. Widgets 4. Taskbar

1. Virtual desktop

Which of the following statements about cleaning LCD monitors and display devices is true? 1. You should power off your monitor and clean it with a lint-free dry cloth. 2. An LCD monitor is best cleaned using a lint rag and glass cleaner. 3. Monitors are best cleaned while powered on in order to observe the effectiveness of your cleaning. 4. Most new monitors are self-cleaning and should not be cleaned using external methods.

1. You should power off your monitor and clean it with a lint-free dry cloth.

Ruth has a startup business and limited resources. She wants to save money by using an operating system on her business computers that has no associated fees for installation. Which of the following operating systems could Ruth install for free? 1. Chrome OS 2. Linux 3. Windows 4. macOS

2. Linux

Which of the following is an open-source operating system? 1. Chrome OS 2. Linux 3. Windows 4. macOS

2. Linux

While on a service call at a customer site, you are discussing the problem with the customer when your cell phone rings. You check the caller ID, and you see that the call is related to parts you ordered for another customer. Which of the following is the MOST professional way to handle the situation? 1. Ignore the phone and let it continue ringing until the caller reaches your voicemail. 2. Ask the customer if it is okay to take the call, and then step into the hallway to briefly talk on the phone. 3. Immediately answer the phone and try to finish the call as fast as you can. 4. Answer the phone and say, "I'm busy right now. I'll call you right back."

2. Ask the customer if it is okay to take the call, and then step into the hallway to briefly talk on the phone.

You are filling out a change order form. Toward its end, you explain how you will return affected hardware and software to its original state if the change fails. What is this plan called? 1. Rollback plan 2. Backout plan 3. System image plan 4. Risk analysis

2. Backout plan

Which of the following documents might a new employee need to sign during the onboarding process? (Select two.) 1. Backup Policy 2. Bring Your Own Device (BYOD) Policy 3. Acceptable Use Policy (AUP) 4. Regulatory and Compliance Policy 5. User Education and Awareness Policy

2. Bring Your Own Device (BYOD) Policy 3. Acceptable Use Policy (AUP)

As you arrive on-site at a customer's place of business, you go to the front desk and ask for the manager of the IT department. The manager greets you and tells you to use their first name, which is Robin. Robin then escorts you to the printer, which is jammed. After you fix the printer, the existing print job completes. As the paper comes out, you notice that one of them is marked confidential and has to do with an upcoming merger. You find Robin and say, "Robin, your printer is fixed and working perfectly." Robin then escorts you off the premises. When you get home that evening, you tell your spouse about the merger document you saw. The next day, you call Robin to verify that the printer is still functioning properly. Which of the following professionalism principles did you fail to to follow? 1. Use appropriate professional titles. 2. Deal with confidential materials appropriately. 3. Avoid being judgmental.

2. Deal with confidential materials appropriately.

Which of the following are procedures that should be included when offboarding (ending a relationship with) an employee? (Select two.) 1. Review the Acceptable Use Policy (AUP) with the employee. 2. Disable electronic access for the employee. 3. Make sure the employee has access to the company's knowledge base. 4. Collect physical access items from the employee. 5. Have the employee sign a Non-Disclosure Agreement.

2. Disable electronic access for the employee. 4. Collect physical access items from the employee.

A user sends a print job to a network printer, and it prints page after page of random characters. He calls the help desk, and a technician discovers that the wrong printer driver had been loaded on the user's workstation. The technician loads the correct driver, verifies that the system works correctly, and documents the resolution. Which of the following actions should the technician perform next? 1. Write an email to the user's supervisor and insist that he train his employees on how to use the network printer. 2. Educate the user as to how the problem was resolved and verify that they are satisfied with the results. 3. Upgrade to a newer printer that uses embedded drivers. 4. Disable the network printer until users learn to use the correct drivers. 5. Formally close the incident in any job tracking tool.

2. Educate the user as to how the problem was resolved and verify that they are satisfied with the results.

You are removing screws within a computer, but several have fallen into places you can't reach. Which tool would help retrieve the small screws? 1. Combination ratchet/screwdriver 2. Extension magnet 3. Network tap 4. Punch down tool

2. Extension magnet

What method is used to ensure proper ventilation in a server room? 1. Internal cooling systems 2. Hot and cold aisles 3. Maintaining a steady temperature 4. Internal fans

2. Hot and cold aisles.

Which of the following processors allowed macOS users to run Windows on their computers? 1. IBM 2. Intel 3. AMD 4. M1

2. Intel

A new laptop was delivered to your home and left on the porch while you were at work. It is very cold outside, and you don't know how long it has been there. You unpack the laptop. You would like to know if it is working properly. Which of the following is the BEST action to take? 1. Blow compressed air into the cooling ports before turning the laptop on 2. Let the laptop warm up to room temperature before turning it on. 3. Visually inspect the LCD screen for cracks before turning the laptop on. 4. Place the laptop next to a heater set to High. 5. Turn on the laptop and run self-diagnostic tests.

2. Let the laptop warm up to room temperature before turning it on.

You are a system administrator for a financial institution. Most of your employees work at home and have various work environments. One of your account managers is complaining that customer data is disappearing from her account management application. She insists that she saves data regularly and has not had a problem until recently. Her workstation has both a solid-state drive (SSD) and a traditional hard drive. She runs the application from the SSD drive, but stores the customer data on the hard drive. She has recently moved her desk to a room in her house that is used for entertainment. The room has a sound system with several installed speakers for surround sound. Which of the following types of interference might be causing the issue with disappearing customer data? 1. Electromagnetic interference (EMI) 2. Magnetic fields 3. Negative pressure HVAC system 4. Radio frequency interference (RFI)

2. Magnetic fields

Which of the following vendors offers the largest variety of editions for its operating system? 1. Ubuntu 2. Microsoft Windows 3.Apple macOS 4. Google Chrome

2. Microsoft Windows

A user reports that her system is running slowly when saving files. You determine that you'll need to upgrade her hard disk. You identify the components that are required and schedule the repair for later that afternoon. Which of the following steps have you forgotten in your troubleshooting process? 1. Verify system functionality. 2. Perform a backup. 3. Create an action plan. 4. Implement the solution.

2. Perform a backup.

Which tool would be the BEST choice for securing cable wiring to a patch panel? 1. Network tap 2. Punch down tool 3. Combination ratchet/screwdriver 4. Extension magnet

2. Punch down tool

A user reports that her monitor has stopped working. While troubleshooting the issue, you discover a bad video card in the system. You replace the card and connect the monitor cable to the card. Which of the following actions should you perform NEXT in your troubleshooting strategy? 1. Document the solution. 2. Test the solution. 3. Implement preventative measures. 4. Explain what you did to fix the problem.

2. Test the solution.

Which of the following are included in a network topology diagram? (Select two.) 1. A layout of server racks, cooling, and air circulation systems. 2. The location and IP addresses of hubs, switches, routers, and firewalls. 3. The relationship between remote locations and the WAN links that connect them. 4. A layout of all plumbing and HVAC components. 5. A layout of all electrical wiring and components.

2. The location and IP addresses of hubs, switches, routers, and firewalls. 3. The relationship between remote locations and the WAN links that connect them.

What should you use to clean an inkjet printer's print heads? 1. Damp cloth 2. The printer's cleaning function 3. Anti-static vacuum 4. Denatured alcohol

2. The printer's cleaning function

You are responsible for updating your company's onboard training for all new employees. Which of the following items are important to include in that training? (Select three.) 1. The procedure for closing user accounts 2. The process for reporting suspicious behavior 3. The network diagram 4. The Security Policy 5. The help desk's contact information 6. The Data Backup Policy 7. The User Education and Awareness Policy

2. The process for reporting suspicious behavior 4. The Security Policy 5. The help desk's contact information

You are an IT technician for your company. One of the employees has a computer that continually reboots when it's powered on. He has asked you to fix it. You suspect that the power supply may be failing. Which of the following is the BEST initial step to determine whether the power supply is causing the reboots? 1. Verify that the fan on the power supply is spinning. 2. Use a multimeter to test the power supply. 3. Use a toner probe to test the power cable. 4. Replace the power supply.

2. Use a multimeter to test the power supply.

In which of the following situations should you NOT use an ESD wrist strap? answer 1. When wearing jewelry. 2. When working with high-voltage components. 3. When replacing memory modules. 4. When replacing worn or frayed power cords.

2. When working with high-voltage components.

As the IT administrator for a small consulting firm, you want all the computers in the company office to be able to share files, printers, and local network resources. There are currently 15 computers in the office. Which of the following Windows features could you implement that would MOST closely match your network requirements? 1. Remote Desktop Protocol (RDP) 2. Workgroup 3. Domain access 4. Bitlocker

2. Workgroup

You have responded to a call from a customer who is having problems with his computer. After troubleshooting the problem, you discover the switch on the power strip was off. After switching it on, all of the components and their functionality return to normal. Which of the following is the BEST way to explain the solution to the customer? 1. "Next time you need to call, check this power strip switch. It was turned off. That's why nothing worked. If I were you, I would have checked this first and saved both of us time." 2. "All I did was flip the power strip switch on. You probably bumped it by accident. And that accident just cost you about $80. But don't feel bad, accidents happen to everyone. Although, this one could have been easily avoided." 3. "I found this power strip switch in the off position. Now that it's on, it looks like everything is working. It appears as though that was the problem. Can you confir

3. "I found this power strip switch in the off position. Now that it's on, it looks like everything is working. It appears as though that was the problem. Can you confirm that the problem has been resolved?"

As you arrive on-site to fix an issue, you are met by a frantic employee who immediately details how critical the issue is and how important it is to fix it as quickly as possible. Having seen this same issue many times, you say to the customer, "Stop worrying. I know what I'm doing." Which of the following professionalism principles are you failing to follow? 1. Avoid being judgmental. 2. Maintain a positive attitude. 3. Avoid dismissing customer problems. 4. Avoid an argument with the customer.

3. Avoid dismissing customer problems.

You are an IT technician for your company. A coworker calls your department and asks for help fixing his malfunctioning internal Blu-ray drive, which he installed himself. When you arrive, you unplug and then open the employee's computer. As you begin to examine his computer, the employee begins to describe the steps he has taken to install and troubleshoot the issue on his own. You examine all of the connectors and discover that the employee forgot to connect the Blu-ray drive's power cable. You comment on this to the employee by saying, "Here's this issue. The power cable isn't connected. You should really take more time to make sure components are properly installed before calling me." At that moment, another coworker calls your cell phone. The ringing of the phone distracts your thoughts, and while the owner of the computer is still explaining the troubleshooting steps already completed, you quickly connect the

3. Avoiding being judgmental 5. Actively listening

Besides protecting a computer from under-voltages, a typical UPS also performs which other actions? (Select two.) 1. Protects network cabling from EMI 2. Prevents ESD 3. Conditions the power signal 4. Protects from over-voltages 5. Prevents electric shock

3. Conditions the power signal 4. Protects from over-voltages

As an IT technician for your company, you have been notified that the Windows domain does not seem to be functioning properly. Being familiar with domains, you are fairly confident you know what the issue is. But just to be safe, you take the applicable time to gather additional information and to identify what, if anything, has changed. Which of the following is the BEST next step? 1. Implement the fix. 2. Determine the appropriate fix. 3. Create a hypothesis. 4. Identify what has changed. 5. Gather information.

3. Create a hypothesis.

You are the manager in charge of maintaining desktop computers. A user reports that she can't turn her computer on. After some investigation, you find that the power supply is malfunctioning. Which of the following actions should you perform next? 1. Document the problem. 2. Fix the problem. 3. Create an action plan. 4. Determine whether escalation is required.

3. Create an action plan.

Your U.S.-based company has recently purchased an old office building where employees are being assigned to work. As you are setting up the employees' desktop computers, you come to one location where the nearest wall outlet has only two prongs. All of the metal-enclosed desktop computers have three-prong cords. Which of the following is the BEST way to proceed with that particular desktop computer? 1. Use the existing cord, but remove the grounding prong, as it is not required. 2. Get a new power cord with two prongs to match the wall outlet. 3. Find a different outlet that uses three prongs. 4. Purchase an adapter that converts the three-prong cable to two prongs.

3. Find a different outlet that uses three prongs.

As an IT technician for your company, you are in the process of setting up several servers in your network. During the process, one of the servers was misconfigured and is having trouble synchronizing information with the other servers. Which of the following is the BEST next step? 1. Identify what has changed. 2. Implement the fix. 3. Gather information. 4. Determine the appropriate fix. 5. Create a hypothesis.

3. Gather information.

Which of the following is a myth regarding electrostatic discharge (ESD)? answer 1. Most often, ESD degrades computer components, and they fail at a later date. 2. Simply touching an object can create static electricity. You do not have to rub the object. 3. If you can't feel ESD, the surge is not sufficient to harm computer components. 4. Sitting down or standing up from a chair can create static electricity.

3. If you can't feel ESD, the surge is not sufficient to harm computer components.

You are the PC technician for a company. An employee has gone to a meeting while you fix the computer in her office. She accidentally left a report open next to her computer. It states that a friend of yours in accounting will be submitted for review if their poor work performance continues. Which of the following is the BEST action to take? 1. Give your friend a heads up about what you found, but don't tell them how you got the information. 2. Tell your fellow PC technicians about what you saw and let them decide what to do with the information. 3. Ignore the paper and tell no one of its contents. 4. Tell your friend about the report you saw and whose desk it was on.

3. Ignore the paper and tell no one of its contents.

You are currently running the latest version of Windows 10 on your laptop. You want to install Windows 11 to take advantage of several new features. However, you have critical data on the OS hard drive that you want to preserve while installing Windows 11. Which of the following installation methods should you use? 1. Clean install 2. SCCM 3. In-place upgrade 4. SetupDiag

3. In-place upgrade

Which of the following device types should be plugged into a surge-protected-only outlet on a UPS unit and not a battery backup outlet? 1. External hard disk drive 2. Secondary LCD monitor 3. Laser printer 4. Inkjet printer

3. Laster printer.

Which of the following is true about RFI? 1. Unshielded twisted-pair cables and fiber optic cables can protect RFI signals. 2. You can reduce RFI by using a wireless networking standard that operates in the 2.4 GHz range. 3. RFI is caused by nearby devices, such as cordless phones or microwave ovens. 4. RFI is caused by motors, machinery, and fluorescent lights.

3. RFI is caused by nearby devices, such as cordless phones or microwave ovens.

You are the PC technician for a company. You received the following email from an employee: My email doesn't work. I keep getting email sent back to me, and I can't find any of my old emails. I don't think that the email program has ever worked well. When you arrive at the employee's desk, you observe how the employee accomplishes normal email tasks. You quickly determine that the problem is not with the email program, but that the employee needs to learn how to use the program. You have several high-priority tasks that need to be completed by the end of the day. What is the BEST way for you to respond? 1. Tell the employee to ask their co-workers how to use the program if he come across further problems. 2. Direct the employee to the email program's help utility. 3. Set an appointment to train the employee on how to complete common email tasks. 4. Inform the employee that there isn't anything wrong with the pr

3. Set an appointment to train the employee on how to complete common email tasks.

Jack has a small retail business. He had a custom application developed for his inventory tracking. All of Jack's company computers have an operating system on them that will soon reach end of life because a newer version was released two years ago. Jack is afraid that his custom inventory application won't be compatible with the new version of the operating system. Which of the following is a risk that Jack is taking if he continues to use the operating system after its end of life? 1. He may lose some of the OS's features that he relies on. 2. The custom application may no longer be compatible. 3. The OS will become increasing vulnerable to cyberattacks. 4. He may lose sales during the migration process.

3. The OS will become increasing vulnerable to cyberattacks.

Jared, an employee in Human Resources, left the company two months ago as part of a company downsizing initiative. A new Human Resources VP is now running the department and has re-hired Jared to work as a manager in Human Resources. As a new IT system administrator for the company, you have been assigned to re-establish all of Jared's accounts, including network accounts, email, software, and VPN access. However, you discover that no accounts exist for Jared. What should have been done during Jared's offboarding process to make sure his accounts were still available for a period of time? 1. The accounts should have been deleted, but not removed from the trash. 2. The accounts should have been left in place for a required period of time. 3. The accounts should have been disabled instead of deleted. 4. The account passwords should have been changed.

3. The accounts should have been disabled instead of deleted.

Which problem can occur if your system case fan blows in the wrong direction? 1. Condensation can build up in the computer. 2. A rapid change from cold to warm can cause damage to the components. 3. The flow of air is negated and the system can overheat. 4. Extensive dust can build up and the system can overheat.

3. The flow of air is negated and the system can overheat.

You need to trace the route that a Cat 6 UTP cable takes through the ceiling and walls of your building. Which tool should you use? 1. Loopback plug 2. Cable tester 3. Tone generator 4. Multimeter

3. Tone generator

A maintenance worker accidently nicks a bundle of network cables routed to multiple wall jacks in a conference room. Only one of the cable's wires are severed. A technician is tasked with replacing the cable. Which of the following tools would the technician MOST likely use to identify which wall jack connects to the severed cable? 1. Loopback plug 2. Cable stripper 3. Tone generator and probe 4. Multimeter

3. Tone generator and probe

You work in the computer repair department of a large retail outlet. A customer comes in with a workstation that randomly shuts down. You suspect that the power supply is failing. What should you do first to troubleshoot the issue? 1. Use a multimeter to test the power supply's electrical properties. 2. Use a power supply tester on the power supply. 3. Use a known good spare to swap with the existing power supply. 4. Use a cable tester to check the power supply's connections.

3. Use a known good spare to swap with the existing power supply.

Which of the following BEST describes a Security Policy? 1. A document that defines how often backups should run and where they should be saved. 2. A document that outlines how long a password should be and which characters can be used in the password. 3. A document that outlines who has access to company resources. 4. A document or collection of documents that provide information about an organization's network security.

4. A document or collection of documents that provide information about an organization's network security.

You've just installed a new USB card reader on your Windows computer. Every time you perform a certain action using the card reader, you get an error message that you've never seen before. Which of the following actions should you perform FIRST? 1. Replace the card reader with a new device. 2. Uninstall the device and then reinstall it. 3. Install the device on another computer. 4. Check the manufacturer's website for information about the error.

4. Check the manufacturer's website for information about the error.

Katy is a IT engineer who is responsible for maintaining the environment in her company data center in San Francisco. While swapping motherboards in a server in the data center, she notices that the original motherboard is showing signs of corrosion. Which of the following is the BEST solution to resolve the corrosion issue? 1. Check and clean all corroded server motherboards. 2. Run a diagnostic check on all servers to make sure they are functioning properly. 3. Replace motherboards in the servers more frequently. 4. Decrease the humidity in the data center.

4. Decrease the humidity in the data center.

You are a first-line desktop support technician. A user reports that he cannot access several network files. After some investigation, you determine that the problem is with a network server. Which of the following actions should you perform next? 1. Create an action plan. 2. Fix the problem. 3. Document the problem. 4. Determine if escalation is needed.

4. Determine if escalation is needed.

As a PC technician you know you will be late to an appointment with a customer. Which of the following actions should you take? (Select two.) 1. Explain why you are late. 2. Blame your tardiness on heavy traffic. 3. Tell a joke to ease the situation. 4. Give a realistic timeframe for your arrival. 5. Contact the customer and apologize.

4. Give a realistic timeframe for your arrival. 5. Contact the customer and apologize.

As a systems engineer for a large retail corporation, you have filled out a change order form to replace the laptop computers that sales reps use on the road with business tablets that are much more durable, provide both touch and keyboard options, and are more portable and easier to use when working with clients. The request has been forwarded to the change board, which is reviewing the change order form with you. One of the board members asks if this change will impact plans to move more of the business online to reach customers directly. Which of the following questions does the board member really want answered? 1. What are the desired deliverables? 2. What are the desired outcomes? 3. What is the scope of the requested change? 4. How does this change fit with company's current strategic focus?

4. How does this change fit with company's current strategic focus?

Which of the following is a best practice when using Remote Desktop Protocol (RDP) to access another computer? 1. Make sure both computers have the same amount of RAM. 2. Make sure both computers are in the same workgroup. 3. Enable Bitlocker on the remote computer. 4. Implement additional security protocols.

4. Implement additional security protocols.

A printer is behaving erratically; you suspect a faulty parallel port. Which tool can you use to test the parallel port? 1. Ammeter 2. Multimeter 3. Cable tester 4. Loopback plug

4. Loopback plug

Which of the following components require special disposal procedures to comply with environmental guidelines? 1. Hard disk drive 2. Motherboard 3. Video card 4. Notebook battery

4. Notebook battery.

Which part of the change management process asks how the project will align with the organization's current mission and strategy? 1. Scope of the change 2. Plan for the change 3. Change implementation 4. Purpose of the change

4. Purpose of the change

What is the BEST way to dispose of printer cartridges? 1. Place them in a standard recycling bin. 2. Deliver them to a local recycling facility. 3. Place them in the regular trash. 4. Return them to the manufacturer for recycling.

4. Return them to the manufacturer for recycling.

Which section of a change order form would include the desired outcomes of a project? 1. Backout plan 2. Risk analysis 3. Purpose of change 4. Scope of change

4. Scope of change

An employee calls you to demand more RAM for her computer to complete her work tasks. However, you know that her department doesn't have a budget for new equipment. Your supervisor is the only one that has authority to allocate department funds. Which of the following is the BEST way to respond? 1. Tell the employee that you will get new RAM for their computer as soon as possible. 2. Tell the employee that she should make do with what she has. 3. Tell the employee that the best option is for her to purchase new RAM for the computer and bring it to work. 4. Tell the employee that her department doesn't currently have a budget for equipment upgrades, but that you will let your supervisor know about the request so it can be properly determined if new RAM can be acquired.

4. Tell the employee that her department doesn't currently have a budget for equipment upgrades, but that you will let your supervisor know about the request so it can be properly determined if new RAM can be acquired.

You work for a large company that has over 1,000 computers. Each of these computes uses a wireless mouse and keyboard. Therefore, your company goes through a lot of alkaline batteries. When these batteries can no longer power the intended device, you need to decide what to do with them. Unless otherwise dictated by your local authorities, which of the following would be the EASIEST way to deal with these batteries? 1. They can be recharged. 2. They must be sent to hazardous waste collection. 3. They must be stored onsite until they expire. 4. They can be thrown in the trash.

4. They can be thrown in the trash.

Which of the following is true about negative pressure systems? 1. They force air out through windows, doors, and other openings. 2. They are more energy-effective than positive pressure systems. 3. They filter out airborne particles. 4. They can bring in airborne particles, such as dust or smoke.

4. They can bring in airborne particles, such as dust or smoke.

Your company has a plan in place to upgrade each employee's laptop computer to a newer model every three years. As a result, you often have old laptop batteries. Unless otherwise dictated by your local authorities, which of the following is the BEST way to deal with these types of batteries? 1. They can be thrown in the trash. 2. They can be recharged. 3. They must be stored on-site until they expire. 4. They must be recycled.

4. They must be recycled.

Your company resides in an area with rapid growth in both the corporate and residential areas surrounding your office. As such, your company has been experiencing several brownouts due to power grid problems (too much demand and not enough electricity). Fearing that your computers (especially the servers) could be damaged by these brownouts, your manager has asked you to find a solution to this problem. Which of the following would be the BEST device to recommend to your manager for computer protection? 1. GFCI 2. Power strips 3. Surge suppressor 4. UPS

4. UPS

Which of the following is typically a question asked when defining the scope of change on a change order form? 1. What is likely to go wrong if we implement these changes? 2. Why do you want to make this change? 3. Why is the change needed? 4. What exactly do you want to change?

4. What exactly do you want to change?

You are an information security specialist in charge of developing and implementing security measures for your company. You are currently working with the company's IT system administrator to make sure that all policies and procedures meet city, state, and industry regulations. You have noted that employees often allow coworkers into restricted areas who may not have authorized access. In addition, employees often work from home using company laptops that are often unsecure and frequently contain sensitive company data on the local hard drive. SOLUTION: You update the Acceptable Use Policy (AUP) to clearly state that only authorized employees can access restricted areas with a proper key fob (no tailgating), along with any penalties for non-compliance. To address the laptop security issue, you work with the IT system administrator to update the network diagram and inform employees of the changes to help secure thei

No

Which of the following is currently the most in-use operating system in the world? 1. Chrome OS 2. Ubuntu 3. macOS 4. Windows

Windows


Conjuntos de estudio relacionados

Course 1: Intro to Azure Core Concepts and Services Questions

View Set

Paleontology and Human Evolution Review Sheet

View Set

Clinical Psychology Test 1 Practice Questions

View Set

ACC 210 Chapter 9: long term liabilities

View Set

Life Insurance Policy Beneficiaries

View Set

Econe Chapter 15 Study Questions

View Set