CompTIA A+ 1002 (Core 2) - Sections 4.4 to 4.6

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which computer component may contain mercury, cadmium, and lithium, and should never be thrown out? A) A battery B) A CD drive C) An ink cartridge D) A mouse CA) THIS is what may contain mercury, cadmium, and lithium, as well as other dangerous chemicals. - They should be disposed of according to hazardous waste guidelines. WA1 to WA2) THIS does not contain toxic chemicals, but should be disposed of according to workplace guidelines. - Additionally, many municipalities have regulations that control the disposal of certain types of computer equipment. WA3) THIS contains environmental contaminants other than mercury, cadmium, and lithium. - THESE, like our (CA), should also not be thrown out.

A) A battery WAs) (in order) B, D, C.

What personal protective equipment needs to be taken when servicing photocopiers and laser printers? A) Air-filter mask B) Anti ESD-straps C) Eye protection D) Gloves CA) Use THIS so that it fits over your mouth and nose when servicing photocopiers and laser printers to avoid breathing in the toner particles. - The products in toner powder are not classed as hazardous to health but dust can be a nuisance as it may cause respiratory tract irritation. WA1 to WA2) There is no need to wear THIS when servicing photocopiers and laser printers. - The risk from toner powder is to the respiratory tract. WA2) There is no need to wear THIS for servicing photocopiers or laser printers. - However, if a technician were to remove or install electrical components, then THESE precautions would need to be taken.

A) Air-filter mask WAs) C, D, B.

Your employer is required to comply with certain governmental regulations, such as Occupational Safety and Health (OSHA). Which of the following is NOT provided by an OSHA-compliant employer? A) An Heating, Ventilation and Cooling (HVAC) system B) A properly ventilated workspace C) Material Safety Data Sheets (MSDSs) D) Training regarding hazardous materials CA) An employer compliant with OSHA (Occupational Health and Safety) does not need to provide THIS as long as the work environment is properly ventilated and kept at a proper temperature. WA1) OSHA-compliant employers are required to provide written communication regarding hazardous materials. - THESE are what fulfill this requirement and must be shipped along with hazardous materials. - These sheets must be readily available for employees to reference. WA2) OSHA-compliant employers must also provide THIS. WA3) OSHA-compliant employers must also provide THIS - Hazardous substances such as dusts, fumes, mists, vapors, or gases must be ventilated and dispersed away from any work area.

A) An Heating, Ventilation and Cooling (HVAC) system WAs) C, D, B.

Lifting and handling equipment are common tasks for a technician. What type of object presents a risk of muscle and ligament damage if lifted incorrectly? A) An object that is over the technician's weight limitation B) An object that has sharp or rough edges C) An object that is large or awkward to carry D) An object that contains a hot or corrosive liquid CA) THIS is something that can cause muscle strains, ligament damage, or a back injury. - The technician needs to be aware of THESE, as well as any restrictions and guidance set forth in the technician's job description or site safety handbook. WA1) THIS is something that could cause the technician to trip over or walk into something else. WA2) THIS is something that could CUT the technician. WA3) THIS is something that could BURN the technician.

A) An object that is over the technician's weight limitation WAs) C, B, D.

Which of the following is a safe place to put components while working on hardware? A) Anti-ESD (Anti-Electrostatic Discharge) mat B) Anti-ESD (Anti-Electrostatic Discharge) smock C) Anti-ESD (Anti-Electrostatic Discharge) shielding D) Anti-static bags CA) THIS is a special _____ for working with electrical components. - Sensitive components can be placed on THESE safely. - THEY contain a snap that you connect to the wrist or leg strap. WA1) THIS is used to store and ship FRUs (Field Replaceable Units). - While components can be placed in THIS in lieu of using our (CA), THAT is what's best to use. WA2) THIS can be worn from the waist up over a technician's clothes if there is a risk of static from the clothing. WA3) THIS is packaging material that reduces the risk of ESD because it is coated with a conductive material.

A) Anti-ESD (Anti-Electrostatic Discharge) mat WAs) Bag, Smock, Shielding

Which of the following is used to store and ship Field Replaceable Units (FRUs) to protect them from electrostatic discharge (ESD) damage? A) Anti-static bags B) Anti-ESD mat C) Anti-ESD wrist strap D) Anti-ESD Shielding CA) THIS is used to store and ship FRUs (Field Replaceable Units). - It is either made from anti-ESD shielding material or dissipative packaging. WA1) THIS can dissipate static charges effectively while performing maintenance on electrical equipment. WA2) THIS is a special _____ for working with electrical components. - Sensitive components can be placed on THIS safely. - THESE contain a snap that you connect to the wrist or leg strap. WA3) THIS is packaging material that reduces the risk of ESD because it is coated with a conductive material. - These _____ are usually a shiny grey metallic color.

A) Anti-static bags WAs) W-Strap, Mat, Shielding.

What is considered the proper lifting technique? A) Bend your knees to reach the object while keeping your back as straight as is possible and comfortable and your chin up. B) Bend forward with your eyes pointed to the floor, and lift with the back. C) Bend at the waist and slowly twist the body up as you lift the object. D) Keep the feet close together, and hold the object out as far as possible. CA) To lift a heavy object safely: 1) Plant your feet around the object with one foot slightly toward the direction in which you are going to move. 2) Our (CA), everyone. 3) Find a firm grip on the object then lift smoothly by straightening your legs - do not jerk the object up. 4) Carry the object while keeping your back straight. WA1 to WA3) DON'T do any of these other options. EVER.

A) Bend your knees to reach the object while keeping your back as straight as is possible and comfortable and your chin up. WAs) EVERYTHING ELSE!

Which of the following is best for removing the dust from a difficult to reach fan vent? A) Compressed air B) IPA (99% Isopropyl Alcohol solution) and non-scratch, lint-free swabs C) Soft cloth D) Vacuum cleaner CA) THIS is what is the best way to clean a difficult to reach spot. - THIS should only be used in a controlled environment with appropriate safety masks and goggles. WA1) THIS will not be able to reach into a difficult to reach spot, even if still useful in more reachable ones where our (CA) might always not. WA2) THIS can be used to clean dust from the exterior of the computer chassis, but should not be used to clean inside. - Fibers from THIS are flammable, posing a fire hazard, and can snag on the components, damaging them. WA3) DO NOT USE THESE to clean the internal components of a computer. - BASICALLY, it is better to use (1) or our (CA).

A) Compressed air WAs) D, C, B.

Which of the following scenarios does NOT require the use of an air filter mask? A) Disposing of a swollen battery B) Servicing a laser printer C) Servicing a photocopier D) Using compressed air CA) THIS requires the use of gloves and safety goggles to minimize any risk of burns from corrosive material. - THESE coming from laptop computers or within cell phones and tablets must be handled very carefully and stored within appropriate containers. WA1 to WA2) DOING THESE THINGS requires the use of an air-filter mask due to the toner particles that can irritate the respiratory tract. WA3) DOING THIS requires use of an air filter mask due to the risk of dust particles entering the respiratory tract.

A) Disposing of a swollen battery WAs) B, C, D.

How are matters concerning prohibited content handled by different organizations? A) Each organization can establish its own guidelines and restrictions based on the type of content. B) Organizations must defer to government regulations that define acceptable and unacceptable content. C) Organizations are not allowed to specifically define what is appropriate and inappropriate. D) Restricted content is typically enforced only for employees working on site rather than at home. CA) AS DESCRIBED HERE, also note that some companies have stricter content guidelines than others. WA1) Actually, THIS IS OK. - For example, some will allow access to social media sites, and some will not. - Some companies restrict access to sites based on certain keywords as well. WA2) Actually, Organizations NEED DO THE OPPOSITE in this case. WA3) Restricted content applies to all employees, regardless of an employee's physical location.

A) Each organization can establish its own guidelines and restrictions based on the type of content. WAs) C, B (i.e.: acceptable / unacceptable), D.

What can a technician do to prevent build-up of dust on computer equipment? A) Educate users on how to perform regular preventative maintenance. B) Monitor the temperature and humidity of the office. C) Perform regular preventative maintenance on computers in the office. D) Reduce dust in the office by using an HVAC (Heating, Ventilation, Air Conditioning) system. CA) Providing cleaning materials and procedures to users and training them to DO THESE THINGS themselves can increase the lifespan of the equipment and prevent build-up of dust on computer equipment. - These tasks would include checking ventilation slots and dusting components. WA1) DOING THIS would be very time-consuming. It would be more efficient to do what's asked in our (CA). WA2) USING THIS is most likely all ready being done in an office. - This system is handled by special ________ technicians or by building maintenance employees. WA3) DOING THIS is a function of (2).

A) Educate users on how to perform regular preventative maintenance. WAs) C, D, B.

What does cable management refer to? A) Grouping cables together to keep them out of the way B) Improving the performance of cables by removing sources of interference C) Reducing the number of cables by implementing more wireless devices D) Replacing old, obsolete cables with faster and newer cables CA) Cable management refers to any techniques that are used to DO THIS, aiming to make them hidden from general view. - Sometimes this is as simple as using a Velcro strap to keep a set of cables bound together and prevent them from becoming a tangled mess. WA1 to WA3) Cable management DOES NOT REFER to anything else here.

A) Grouping cables together to keep them out of the way WAs) B, C, D.

Where would a technician find health hazard, precautions and first aid information regarding a chemical in toner? A) Material Safety Data Sheet (MSDS) B) Occupational Safety and Health Administration (OSHA) handbook C) Standard Operating Procedure (SOP) D) Toner label CA) THIS is what provides detailed information on a hazardous material including ingredients, health hazards, precautions and first aid information. WA1) THIS may provide some of the hazard information, but the supplier must also provide more detailed information on our (CA). WA2) THIS handbook is a document that contains policies and regulations that must be followed in a workplace to keep employees safe. - It requires our (CA) and training regarding hazardous materials. WA3) THIS sets out the principal goals and considerations for performing a task and identifies lines of responsibility and authorization for performing it. - It does not discuss chemical information.

A) Material Safety Data Sheet (MSDS) WAs) Toner Label, OSHA, SOP.

Why is it so important to track computer evidence and to have proper documentation all along the forensics path during an incident? A) So that the evidence is admissible in a court of law B) So that law enforcement cannot accuse someone at the company of tampering with evidence C) To help prove the guilt of the criminal D) To prevent the user from erasing any evidence from the computer CA) The most important reason to properly track and document evidence is FOR THIS REASON. WA1) Every person in the chain who handles evidence must log and document the process, methods, and tools they used. - This prevents THIS BLUNDER from likely occurring. - This is the proper way of handling evidence; it is not the reason to properly track and document evidence. WA2) DOING THIS is not a reason to have proper documentation of an incident. WA3) THIS ACTION is not done by documentation. It is done by properly preserving the data device.

A) So that the evidence is admissible in a court of law WAs) B, C, D.

Why must a technician take special care when handling a cell phone with a swollen battery? A) To minimize the risk of burns B) To minimize the risk of cuts C) To minimize the risk of muscle strain or ligament damage D) To minimize the risk to the respiratory tract CA) Swollen or leaking batteries from laptop computers or within cell phones and tablets must be handled very carefully and stored within appropriate containers. - Use gloves and safety goggles to minimize THESE from corrosive material. WA1) Objects with sharp edges or corners present a hazard. - DO THIS when handling these objects by wearing gloves or using a cart. WA2) Heavy or unwieldy objects preset a hazard. - DO THIS when handling these objects by using proper lifting techniques or a cart. WA3) Air borne particles present a hazard. - DO THIS when working in a dusty environment by wearing an air filter mask.

A) To minimize the risk of burns WAs) B, C, D.

Which of the following is an example of self-grounding? A) Touching an unpainted metal part of the PC B) Running a dehumidifier C) Wearing a fleece sweatshirt D) Working on a carpeted surface CA) DOING THIS, such as the power supply unit, will release any static electricity before you begin work. This will decrease the risk of electrical shock. WA1) DOING THIS increases static electricity. It is best to work on a hard surface, if possible. WA2) DOING THIS in the work area will dry out the air, increasing the risk of static electricity. WA3) DOING THIS ncreases the risk of static electricity. - An anti-ESD smock may be worn over THIS to reduce the risk.

A) Touching an unpainted metal part of the PC WAs) D, B, C.

What is the record of tracking evidence from collection through presentation in court known as? A) Acceptable Use Policy (AUP) B) Chain of custody C) Incident response policy D) Local Security Policy CA) THIS is the record of tracking evidence from collecting it as part of the first response up through presentation in court. - The evidence may include the data that was accessed or used inappropriately, or the equipment used to access the data. WA1) THIS sets out how someone is allowed to use a particular service or resource. - It could be enforced by a business to govern how employees use equipment and services such as telephone or Internet access provided to them at work. WA2) THIS refers to password and account policies can be configured on a standalone workstation. WA3) THIS is what sets out procedures and guidelines for dealing with security incidents.

B) Chain of custody WAs) A, D, C.

Which of the following scenarios requires the use of safety goggles? A) Disposing of a Cathode Ray Tube (CRT) monitor B) Destroying a disk with a drill / hammer C) Moving equipment with sharp edges D) Servicing a photocopier CA) DOING THIS requires the use of gloves and goggles to avoid getting metal dust in the eyes. WA1) DOING THIS does not require any personal protective equipment unless it is broken. - If broken, the monitor contains hazardous materials, including lead, and should be handled with caution. WA2) DOING THIS requires the use of an air-filter mask due to the toner particles that can irritate the respiratory tract. WA3) DOING THIS requires the use of a cart in order to avoid cuts and personal harm.

B) Destroying a disk with a drill / hammer WAs) A, D, C.

When cleaning a computer with compressed air to remove dust from the components, which protective gear item should computer technicians wear? A) Anti-static wristband B) Dust mask C) Eye protection D) Gloves CA) THIS is an essential piece of personal protective equipment when cleaning dust from a computer. - One that fits over your mouth and nose should be worn when you are using a compressed air canister, working around toner spills, or working in an otherwise dusty environment. WA1) THESE don't prevent dust spreading, but should be worn when working with electrical components. WA2) THIS should always be worn when working with electrical or mechanical devices, but is not limited to removing dust from a computer. WA3) THESE don't prevent dust spreading, but should be worn when working with liquids, such as toner.

B) Dust mask WAs) A, C, D.

What are the immediate actions that follow an incident, including identifying and reporting, known as? A) Documentation B) First response C) Forensic investigation D) Preparation CA) THIS is The immediate actions that follow an incident. - This often includes the individual or individuals who must perform the work involved in responding to the incident. - Employees at all levels of the organization must be trained to recognize and respond appropriately to actual or suspected security incidents. WA1) THIS is necessary and crucial throughout a security incident. WA2) THIS encompasses the entire security incident handling life-cycle. WA3) THIS occurs when security professionals make the system resilient to attack in the first place. - This includes hardening systems, writing procedures, and establishing confidential lines of communication. - It also implies creating incident response resources and procedures.

B) First response WAs) A, C, D.

Which of the following provides data protection laws in the European Union? A) Digital Rights Management (DRM) B) General Data Protection Regulation (GDPR) C) National Institute of Standards and Technology (NIST) D) Payment Card Industry Data Security Standard (PCI DSS) CA) THIS framework provides data protection laws for personal data in the European Union (EU). - These laws make data handlers responsible for compliant collection and storage of personal information. WA1) THIS is what establishes best-practice frameworks for security controls in technology. WA2) THIS is what governs processing of credit card and other bank payments. - It sets out protections that must be provided if cardholder data is stored. WA3) THIS is copy protection for digital music and video. - For example, when music is purchased online, the vendor may license the file for use on a restricted number of devices.

B) General Data Protection Regulation (GDPR) WAs) NIST, PCI DSS, DRM.

Where should a technician put a tablet with a leaking battery? A) Directly in the dumpster B) In a special, designated container C) In the recycling bin D) In a storage area CA) Swollen or leaking batteries from laptop computers or within cell phones and tablets must be handled very carefully and stored within THESE. - Use gloves and safety goggles to minimize any risk of burns from corrosive material. WA1) Leaking batteries should not be disposed of HERE. WA2) Leaking batteries should not be disposed of HERE. - Electronic equipment can be ________, but cannot be ________ with standard paper recycling methods. WA3) Leaking batteries should HAVE THIS, as they pose a considerable risk to anyone who may accidentally handle them without proper protective equipment.

B) In a special, designated container WAs) A, C, D.

What is the best location for storing a backup or unused random-access memory (RAM) module? A) In a soft felt pouch B) In an anti-static bag C) In a plastic bin D) In a metallic container CA) THIS is the best location to store unused RAM modules. - This will prevent the components from being damaged by ESD. Components such as RAM modules are very sensitive to static shocks, and even a small amount of electrostatic discharge (ESD) can damage them. WA1 to WA2) These ARE is not the best location for storing unused RAM. The best place is in an anti-static bag. WA3) THIS is not a recommended place to store computer components. - THIS would provide little physical protection and could produce static electricity.

B) In an anti-static bag WAs) Container, Bin, Pouch.

How can you prevent airborne particles from damaging a computer system? A) Install a dehumidifier in the work area. B) Install an equipment enclosure that prevents contaminants from entering the system. C) Use an air-filter mask when working on the computer system. D) Use protective eye-wear when working on the computer system. CA) To protect your computing environment from airborne particles, you can DO THIS. WA1) THESE help solve issues regarding humidity, not airborne particles. - THEY reduce moisture in the air, protecting equipment from rust and condensation. - Care should be used not to create a dry environment in which electrostatic discharge becomes a problem. WA2) THIS will prevent airborne particles, such as dust or compressed air, from irritating your eyes, but cannot protect the computer equipment. WA3) THIS will prevent airborne particles, such as toner dust, from irritating your respiratory tract, but cannot protect the computer equipment.

B) Install an equipment enclosure that prevents contaminants from entering the system. WAs) A, D, C.

What is included within an Acceptable Use Policy (AUP)? A) Guidelines for setting up a work environment to comply with government health and safety laws B) Practices & Guidelines that employees must follow when using company-owned equipment and information-related resources C) A list of all job roles at the company and the associated permission set that accompanies each role D) Procedures that must be followed when dealing with hazardous materials CA) Most organizations will have an AUP (Acceptable Use Policy), which includes EXACTLY THESE. WA1) THESE SPECIFICALLY are typically maintained by the Information Technology department and verified by information owners, but is not included in an AUP. WA2) THESE SPECIFICALLY are typically defined by the Occupational Safety and Health Administration (OSHA). WA3) THESE SPECIFICALLY are typically found on a Material Safety Data Sheet (MSDS).

B) Practices & Guidelines that employees must follow when using company-owned equipment and information-related resources WAs) C, A, D.

Which type of license can only be installed on one computer at a time and may be transferred between computers? A) OEM B) Retail C) Server D) Volume CA) THIS is a personal license that can be transferred between computers. - This type of license is usually offered in Full and Upgrade versions. WA1) THIS is an enterprise license that supports the installation of software on multiple computers. - THESE licenses are designed to simplify license management in large organizations. WA2) THIS license specifies not only how many servers it includes, but also how many clients each of THESE can support. WA3) THIS license covers software that comes preinstalled on equipment. - This software cannot be transferred between computers.

B) Retail WAs) Volume, Server, OEM.

Which of the following statements regarding electricity safety is accurate? A) Most power supplies produce such a low voltage that they are not considered a potential danger. B) You can still suffer a severe electric shock while the computer is plugged in, even if it is turned off. C) You are safe from suffering electricity-related injuries as long as you shut the computer down. D) You are only susceptible to electric shock if you are working on the computer while it is still on. CA) Power supplies have a high voltage in them any time the computer is plugged in, even in THIS STATE. - Before you come into contact with any internal components, disconnect the power cord and press the power button to dissipate any remaining power in the system circuitry. WA1) While THIS is TRUE, the power supply is a dangerous exception to this. WA2) You are still susceptible to electric shock, even if the computer power is in THIS OTHERWISE OPPOSITE STATE. WA3) You are not safe from suffering electricity related injury by simply DOING THIS. - Take proper precautions any time you are working on a computer.

B) You can still suffer a severe electric shock while the computer is plugged in, even if it is turned off. WAs) A, D, C.

What type of device would help protect your equipment from being damaged during a lightning storm? A) A generator B) A strip plug C) A surge suppressor D) An uninterruptible power supply (UPS) CA) THIS is what is designed to reduce or eliminate the impact of surges or spikes to any devices connected to it. - Lightning storms can create power surges in the line. - If the building is struck by electricity, any equipment plugged in at the time is susceptible to being permanently damaged. WA1) THIS is used to provide power during a brownout or blackout. - It does not provide any protection to equipment. WA2) THIS is not always like our (CA). - It is important to make sure equipment is plugged into THESE (our (CA)). WA3) THIS protects equipment during a power loss by providing enough power for a graceful shutdown. - An UPS does not protect against lightning damage.

C) A surge suppressor WAs) A, B, D.

What piece of equipment protects connected devices from brownouts and also powers the device for a short time during blackouts? A) A generator B) A surge suppressor C) An uninterruptible power supply (UPS) D) A voltmeter CA) THIS is a device that provides power to connected circuits when the main source of power becomes unavailable. - It is sometimes informally referred to as a battery backup. WA1) THIS is is meant for long-term use, unlike or (CA). - Our (CA) is only used to support computer systems until THIS is running or they can be powered off normally. WA2) THIS protects equipment against damage from sudden sharp increases in voltage or current, but will not provide backup power to devices in the event of a blackout. WA3) THIS is an instrument used for measuring electrical potential difference between two points in an electric circuit.

C) An uninterruptible power supply (UPS) WAs) A, B, D.

What is the term for providing a path of least resistance for the electrical current to flow? A) Daisy-chaining B) Electrostatic Discharge (ESD) C) Grounding D) Self-grounding CA) THIS involves providing a path of least resistance for an electrical current to flow away harmlessly if there is a fault that causes metal parts in the equipment to become live. WA1) THIS is a temporary method of releasing any built-up static electricity on yourself or your clothes before touching electrical equipment. - Touching an unpainted metal part of a computer is an example. WA2) THIS refers to connecting multiple power strips together. - This is a dangerous practice as it could cause the strip to exceed its maximum load. WA3) THIS occurs when a path is created that allows electrons to rush from a statically charged body to another with an unequal charge. - The electricity is released with a spark.

C) Grounding WAs) D, A, B.

What material found in old cathode ray tube (CRT) monitors requires companies to follow specific guidelines when disposing of them? A) Capacitors B) Glass C) Lead D) Plastic CA) CRT (Cathode Ray Tube) monitors contain THIS, which is considered a hazardous material. - For this reason, companies usually have to abide by specific guidelines when disposing of CRT monitors and other display devices, including old television sets. WA1 to WA2) CRT monitors contain THESE; however, our (CA) and other hazardous chemicals require special care when disposing of them. WA3) CRT monitors contain THESE, which represent a high risk of electric shock. - Special care should be taken when handling these.

C) Lead WAs) Glass, Plastic, Capacitors.

A new storage appliance was delivered to the data center. What is the best action for administrators to take after they receive it? A) Immediately unpack and install the equipment. B) Immediately unpack and take inventory of the equipment. C) Leave the equipment in its packaging for a few hours before opening it. D) Let the equipment sit out of the packaging in the server room for a day. CA) It is important to DO THIS FIRST in this scenario. - Depending on the outside temperature, condensation can form as a result of sudden warming. WA1) If administrators DO THIS FIRST, they risk condensation forming on electrical components. WA2) If administrators DO THIS FIRST, they risk condensation forming on electrical components. - The equipment should be left in its packaging in order to come to room temperature gradually. WA3) DOING THIS is not the best action for administrators to take. - The equipment will come to room temperature gradually if left in the packaging. - Also, DOING THIS poses unnecessary risks.

C) Leave the equipment in its packaging for a few hours before opening it. WAs) A, B, D.

For some software, the source code is available. What is this type of software called? A) Commercial B) Freeware C) Open-source D) Shareware CA) THIS is software that also makes the source code available. - Source code is the program code used to design the software. - THIS, SPECIFICALLY, is not necessarily free. - The idea is that other programmers can investigate the program and make it more stable and useful. WA1) THIS is any software that is available for licensing to end-users. It also includes software used for ____________ use. WA2) THIS is any software available for free, whether open source or closed source. WA3) THIS is software that you can install for free, as long as you evaluate it for a limited time.

C) Open-source WAs) Commercial, Freeware, Shareware.

A data breach of this type of unrecoverable information could cause huge reputational damage due in part to the fact that the data could be used to exploit and blackmail individuals. A) Bank account numbers B) Credit card numbers C) Personal Health Information (PHI) D) Personally Identifiable Information (PII) CA) THIS could be exploited for insurance fraud or to blackmail victims. - THIS refers to insurance and medical data. - THIS is highly sensitive and unrecoverable. WA1) THIS is data that can be used to identify, contact, or locate an individual or, in the case of identity theft, to impersonate them. - THIS is sensitive information, but not as highly guarded as our (MC). WA2 to WA3) THESE are BOTH not unrecoverable. These numbers can be changed if compromised, unlike our (CA).

C) Personal Health Information (PHI) WAs) D, B, A.

A technician walks into a data center and notices that the rack is full and that a lot of heat is lingering in the rack cabinet. Which environmental control should be implemented to resolve the problem? A) Anti-static vacuuming B) Battery backup C) Proper ventilation D) Surge suppression CA) THIS will help remedy the problem of heat collecting in the rack cabinet. - In a data center, this is usually achieved through proper placement of server racks along with an HVAC (Heating, Ventilation, Air Conditioning) system. WA1) DOING THIS will not remedy the problem of heat collecting, but could help cool the system if dust was collecting. WA2) USING THIS will not remedy the problem of heat collecting. - THIS is a power redundancy used to provide power to the system in the event of a power outage. WA3) THIS will not remedy the problem of heat collecting; however, THIS provides very critical protection for a computer system in the event of a power surge.

C) Proper ventilation WAs) A, B, D.

To ensure proper ventilation in a rack cabinet, what should a technician do? A) Install exhaust fans in the top and in the bottom of the rack cabinet. B) Leave both rack cabinet doors open to allow for better ventilation. C) Separate servers so that there is space between them to allow adequate airflow. D) Set up a fan at the back of the rack to blow the warm air out of the cabinet. CA) Sometimes hardware technicians install servers one on top of the other and air cannot circulate for proper cooling. - To prevent this, the technician should DO THIS. WA1) Most racks have exhaust fans in one spot, but never in the opposite. WA2) Most data centers will not allow THIS to be a thing, as it presents a hazard. WA3) THIS will not be allowed in a data center. - Most servers are designed to pull air from the front to the back for cooling, THIS being installed can actually work against this design and cause the systems to overheat.

C) Separate servers so that there is space between them to allow adequate airflow. WAs) A, B, D.

Why is it important for someone purchasing software to read and to understand the End User License Agreement (EULA)? A) So the purchaser can find legal loopholes in the EULA B) Because most purchasers do not read the EULA C) So that the purchaser knows what they are agreeing to D) So that the purchaser cannot claim ignorance of the agreement and its stipulations CA) It is important for someone who purchases software to read and to understand the EULA because it is a legal contract that is AS SUCH, THIS, for when the person opens and uses the software. WA1) It is important for all purchasers to DO THIS, whether you like it or not, so as to agree to and comply with it. WA2) The purchaser must agree to the EULA, usually by clicking a button or checking a box on the screen. - This negates the purchasers ability to EVER DO THIS. WA3) The intent behind reading and understand the EULA is NOT THIS, but to know the terms of the agreement.

C) So that the purchaser knows what they are agreeing to WAs) B, D, A.

How should an electrical fire in a computer facility hbe handled? A) Apply a gentle stream of water at the base of the fire. B) Open as many windows as possible and try to fan the flames. C) Special gases are needed for fires in computing environments. D) Use a small fire extinguisher and sweep back and forth. CA) HERE, the best type to use is a Carbon Dioxide (CO2) gas extinguisher. - CO2 extinguishers have a black label. - Dry powder extinguishers can also be used, though these can damage electronic equipment. WA1) It is not practical to douse electrical fires with THIS, as it is a conductor of electricity. WA2) It is not practical to fight electrical fires with THESE. - Many of THESE tend to use water or foam, which can be dangerous if used near live electrical equipment. WA3) It is not safe to DO THIS (at all) with any uncontrolled fire, such as an electrical fire.

C) Special gases are needed for fires in computing environments. WAs) A, D, B.

Which of the following attaches to a technician's wrist or ankle to reduce the risk of electrostatic discharge (ESD)? A) Anti-ESD smock B) Anti-ESD shielding C) Anti-ESD mat D) Anti-ESD strap CA) THIS can dissipate static charges effectively. - THIS is worn on the skin of the wrist or ankle. - THIS is made either using a grounding plug that plugs into a wall socket or a crocodile clip that attaches to a grounded point. WA1) THIS is a special _____ for working with electrical components. THESE contain a snap that you connect to the wrist or leg strap. WA2) THIS can be worn from the waist up over a technician's clothes if there is a risk of static from the clothing. WA3) THIS is packaging material that reduces the risk of ESD because it is coated with a conductive material.

D) Anti-ESD strap WAs) Mat, Smock, Shielding.

What is the reason for removing jewelry prior to working on or near computer equipment? A) Jewelry can become lost. B) Jewelry can interfere with wireless signals and might skew diagnostic results. C) Jewelry may become scratched or damaged. D) Jewelry is made of conductive metals. CA) BECAUSE OF THIS, even if the technician has dissipated static electricity, a powerful shock can be delivered through jewelry. - Additionally, jewelry caught in fans or touching connections can destroy the jewelry and the electronic components. - Removing jewelry prior to working on computer equipment is a standard practice. WA1) Jewelry is not likely to DO THIS. WA2 to WA3) THESE are NOT reasons for removing it prior to working on or near computer equipment.

D) Jewelry is made of conductive metals. WAs) B, A, C.

If your manager informs you that you are in charge of computer forensics following an incident, which of the following is your responsibility? A) Documenting the organization's policy for acceptable use and content access B) Escorting the offender from the work area and collecting equipment for disposal C) Filling out the incident report and describing what happened in detail D) Preserving and investigating the data and the equipment used for purposes of evidence CA) You are in charge of EXACTLY THIS. Remember THAT well! WA1) You are not in charge of THIS. - Establishing this policy is not within the scope of computer forensics. WA2) You are not in charge of EITHER of THESE things. - You are responsible for recovering any equipment involved in order to establish a chain of custody and preserve any evidence. WA3) You are not in charge of THESE 2 THINGS, either!

D) Preserving and investigating the data and the equipment used for purposes of evidence WAs) A, B, C.

Which regulatory agency requires companies to provide a workplace that is free from recognized hazards? A) The Consumer Product Safety Commission (CPSC) B) The Environmental Protection Agency (EPA) C) The Food and Drug Administration (FDA) D) The Occupational Safety and Health Administration (OSHA) CA) THIS AGENCY requires companies to provide their employees with a workplace free from recognized hazards that could cause serious physical harm. - If the job involves exposure to specific known hazards, then personal protective equipment must be provided to those who will perform the work. WA1) THIS is an agency that promotes safety of consumer products. WA2) THIS is an agency that regulates materials safety and environmental legislation. WA3) THIS is an agency that regulates food and drug safety.

D) The Occupational Safety and Health Administration (OSHA) WAs) CPSC, EPA, FDA.

Which of the following is responsible for governing processing of credit card and other bank payments? A) General Data Protection Regulation (GDPR) B) Digital Rights Management (DRM) C) National Institute of Standards and Technology (NIST) D) The Payment Card Industry Data Security Standard (PCI DSS) CA) THIS is what governs processing of credit card and other bank payments. - It sets out protections that must be provided if cardholder data is stored. WA1) THIS is what establishes best-practice frameworks for security controls in technology. WA2) THIS framework provides Data Protection laws for personal data in the European Union (EU). - These laws make data handlers responsible for compliant collection and storage of personal information. WA3) THIS is copy protection for digital music and video. - For example, when music is purchased online, the vendor may license the file for use on a restricted number of devices.

D) The Payment Card Industry Data Security Standard (PCI DSS) WAs) NIST, GDPR, DRM.

What is the primary reason for using a rubberized electrostatic discharge (ESD) mat? A) To prevent the user from slipping while working on delicate components B) To prevent components from being damaged if they are dropped C) To improve the ergonomics of the work area and prevent fatigue D) To ground the user and prevent the transfer of static electricity CA) An ESD mat is useful for providing THIS to work from. - ESD mats lower the chances that a technician will sustain an electrostatic injury when touching components, and will reduce the risk of damage to the component. WA1) An ESD mat's primary reason is not to DO THIS, although this could be a secondary reason. WA2 to WA3) An ESD mat's primary reason is not THESE. - The primary reason is our (CA).

D) To ground the user and prevent the transfer of static electricity WAs) C, A, B.

You are performing maintenance on a laser printer. Which of the following is appropriate for removing a large amount of toner dust? A) Compressed air B) IPA (99% Isopropyl Alcohol solution) and non-scratch, lint-free swabs C) Soft cloth D) Vacuum cleaner CA) Use an approved toner safe product to remove toner dust, if necessary. - It should be a PC unit and labeled "toner safe." WA1) Do not use THIS to clean a laser printer. - You risk blowing toner dust into the room, creating a health hazard. - THIS should only be used in a controlled environment with appropriate safety masks and goggles. WA2) Use THIS to wipe dust and toner away, however, since there is a large amount of tone you need to use an approved toner safe ________. WA3) USE THESE ONLY to clean rollers. - DO NOT do so to clean a large amount of toner.

D) Vacuum cleaner WAs) A, C, B.

Which of the following is NOT an example of Personally Identifiable Information (PII)? A) Address B) Birth date C) Name D) Vehicle model CA) THESE are NOT necessarily PII unless paired with information, such as your street of residence. - When put together, those details make a person identifiable. WA1 to WA3) THESE are ALL generally considered PII. - They are usually found along side other information, such as name and age. - Any information that could be used to identify and/or locate a person qualifies.

D) Vehicle model WAs) A, B, C.

Two computer technicians are working together on a rack of computers in a data center. Technician A tells Technician B that the power to the rack they are working on is disconnected. What should Technician B do at this point? A) Commence work on the racked systems. B) Disconnect all network cables from the racked systems. C) Touch a metal surface to dissipate any static electricity. D) Verify that the power is off to the rack. CA) Technician B should DO THIS FIRST. - Do not just assume anything without checking it out for yourself. WA1 to WA2) Before DOING THESE THINGS, each technician should verify all safety considerations are met. WA3) DOING THIS is a simple method of self-grounding, but less effective than other means. - If working on a rack of computers the technicians need to use anti-electrostatic discharge straps or other means of self-grounding.

D) Verify that the power is off to the rack. WAs) A, B, C.


Kaugnay na mga set ng pag-aaral

I. ABDOMINAL REVIEW - 12. The Face & Neck

View Set

Med Surg Acid Base, Fluid, Electrolyte

View Set

Interest Sensitive & Non-traditional Policies

View Set