TestOut Introduction to Computers (A+) Chapter 2 Review
Which of the following documents might a new employee need to sign during the onboarding process? (Select two.) - Backup Policy - Acceptable Use Policy (AUP) - Bring Your Own Device (BYOD) Policy - Regulatory and Compliance Policy - User Education and Awareness Policy
- Acceptable Use Policy (AUP) - Bring Your Own Device (BYOD) Policy An Acceptable Use Policy (AUP) defines an employee's rights to use company property. May be signed at onboarding. A Bring Your Own Device (BYOD) Policy defines which types of personal devices an employee can use for business tasks and which restrictions may apply. May be signed at onboarding. Regulatory and Compliance Policy demonstrates adherence to laws, regulations, guidelines, and specifications relevant to its business processes. It is not signed by an employee. A User Education and Awareness Policy may dictate some of the content included in an onboarding process, but this policy would not be a document signed by a new employee.
As part of Employee Education and Awareness Policy training for all new employees, which of the following should you instruct your employees NOT to do as part of company procedures? (Select three.) - Connect unauthorized devices. - Become familiar with the company Security Policy - Install software on their company laptops. - Access restricted areas in the company building. - Respond to social engineering attacks. - Bring your own devices to work. - Click on links in a phishing email.
- Connect unauthorized devices. - Respond to social engineering attacks. - Click on links in a phishing email.
You are responsible for updating your company's onboard training for all new employees. Which of the following items are important to include in that training? (Select three.) - The procedure for closing user accounts - The help desk's contact information - The network diagram - The Data Backup Policy - The User Education and Awareness Policy - The process for reporting suspicious behavior - The Security Policy
- The help desk's contact information - The Security Policy - The process for reporting suspicious behavior The Security Policy, the help desk's contact information, and the process for reporting suspicious behavior are all important items to include in onboard training for new employees. The User Education and Awareness Policy normally includes a list of what should be included in the onboard training for all new employees. This policy is not part of the training itself.
Besides protecting a computer from under-voltages, a typical UPS also performs which other actions? (Select two.) -Prevents ESD -Conditions the power signal -Prevents electric shock -Protects from over-voltages -Protects network cabling from EMI
-Conditions the power signal -Protects from over-voltages
Which of the following are common tools used to physically clean the inside of a computer? (Select two.) -Damp rag -Natural bristle brush -Wire brush -Compressed air -Industrial degreaser
-Natural bristle brush -Compressed air
List the steps included for a standard "change order form" in order. (Not all will be used.) - Proposal to the customer - Risk analysis - Explanation of changes already made - Purpose of the change - Proposal to CEO - Backout plan - Scope of the change - Change board membership
1) Purpose of the change 2) Scope of the change 3) Risk analysis 4) Backout plan
While it takes 3,000 volts or more of ESD before you can feel it, it takes very little ESD to damage a computer component. What is the minimum ESD volt discharge that can actually damage a component? -500 volts -10 volts -50 volts -100 volts
10 volts
(Summary) While on site you working with a customer your phone rings. Caller ID says the call is about parts you ordered for another customer. (/s) Which is the MOST professional way to handle the situation? - Ask if it is okay to take the call, then step into the hallway to briefly talk on the phone. - Immediately answer and try to finish the call as fast as you can. - Ignore the call and let it continue ringing until it reaches voicemail. - Answer the phone and say, "I'm busy right now. I'll
Ask the customer if it is okay to take the call, and then step into the hallway to briefly talk on the phone.
(Summary) You arrive and aren't really listening. You think the person is stupid and your phone rings while they're still explaining the issue and you're already fixing it. You get it working. (/s) Which of the following professionalism principles is the technician failing to follow? (Select two.) - Avoiding being judgmental - Argue with customers and/or be defensive - Allow the client to speak and avoid interrupting - Talking to coworkers while interacting with customers - Actively listening
Avoiding being judgmental Actively listening
As an IT technician you have been notified that the Windows domain does not seem to be functioning properly. Being familiar with domains, you are fairly confident you know what the issue is. But just to be safe, you take the applicable time to gather additional information and to identify what, if anything, has changed. Which of the following is the BEST next step? - Identify what has changed. - Gather information. - Implement the fix. - Determine the appropriate fix. - Create a hypothesis.
Create a hypothesis. Reason: You've performed the first two essential steps of gathering additional information and identifying what, if anything, has changed. The best next step is to create a hypothesis that could potentially explain the problem.
Jason is a system administrator for a hospital. As part of his role, he helps to maintain all devices in the hospital that connect to the internet (IoT devices). Recently, the hospital has purchase some new heart-rate monitoring devices that are IoT- enabled. Jason needs to add the devices to the inventory management database. Which of the following is the asset management phase that Jason is currently involved with? - Operations - Priority - Deployment - Procurement
Deployment Deployment is the asset management phase where information about an asset is recorded in the inventory management database.
To improve the safety of your location and comply with regulations regarding work environments with hazardous materials, you have been assigned to assemble Material Safety Data Sheets (MSDS) for all chemicals used in your shop. How should you obtain these documents? -Download them from the chemical manufacturer's websites. -Write them yourself after researching the issues. -Ask your manager for them. -Get them from your local workers' safety insurance office.
Download them from the chemical manufacturer's websites.
You work for a store that sells and repairs computers. Due to the room's layout, while repairing computers, you must walk from one side of the carpeted room to the other frequently. Which of the following would BEST protect you from static electricity buildup? - Self-grounding - ESD wrist strap - ESD mat - ESD heel strap
ESD wrist strap
As an IT technician for your company, you are in the process of setting up several servers in your network. During the process, one of the servers was misconfigured and is having trouble synchronizing information with the other servers. Which of the following is the BEST next step? - Implement the fix. - Gather information. - Identify what has changed. - Create a hypothesis. - Determine the appropriate fix.
Gather information. Reason: A technician's first step is to gather information. This is critical. You need to determine exactly what has happened. By gathering additional information, you can identify what has changed, and then you can form a hypothesis.
What method is used to ensure proper ventilation in a server room? - Maintaining a steady temperature - Internal fans - Hot and cold aisles - Internal cooling systems
Hot and cold aisles
Your workstation is unable to communicate with any other computer on the network. Which of the following tools should you use to test the network card's abilities to send and receive signals? -Loopback plug -Cable tester -Multimeter -ping command
Loopback plug
A printer is behaving erratically; you suspect a faulty parallel port. Which tool can you use to test the parallel port? - Multimeter - Ammeter - Cable tester - Loopback plug
Loopback plug A loopback plug allows an output signal to be returned as input. Loopback plugs are used to test serial and parallel ports.
Your workstation is unable to communicate with any other computer on the network. Which of the following tools should you use to test the network card's abilities to send and receive signals? - ping command - Loopback plug - Cable tester - Multimeter
Loopback plug Use a loopback plug to test the network card's ability to send and receive signals.
A cstmr says that data is disappearing. She saves data regularly. She has both a SSD and a HDD. She runs the app from the SSD drive, but stores the data on the HDD. She has recently moved her desk to a room with several installed speakers for surround sound. Which of the following types of interference might be causing the issue with disappearing customer data? - Negative pressure HVAC system - Electromagnetic interference (EMI) - Magnetic fields - Radio frequency interference (RFI)
Magnetic fields
To prevent ESD when replacing internal computer components, you attach an anti-static wrist strap to your wrist. Where should the other end be fastened? (Select two.) - Ground wire on the power supply - Metal area on the computer case - Screw on the wall power outlet - Anti-static mat - Ground wire on the wall power outlet
Metal area on the computer case. Anti-static mat.
During which asset management phase would you perform maintenance tasks, such as installing updates and patches or upgrading a hard drive? - Decommissioning - Deployment - Operations - Procurement
Operations Updates, patches, and hard drive upgrades occur during the Operations phase. Procurement = Purchasing assets, includes research if potential assets will work Deployment = Implementation and recording information about assets Decommissioning = Disposal of assets
Which tool would be the BEST choice for securing cable wiring to a patch panel? - Network tap - Combination ratchet/screwdriver - Extension magnet - Punch down tool
Punch down tool Reason: A punch down tool is used to secure cable wiring to a punch-down block or a patch panel.
Which part of the change management process asks how the project will align with the organization's current mission and strategy? - Change implementation - Scope of the change - Purpose of the change - Plan for the change
Purpose of the change (The scope, plan for change, and change implementation are parts of the change management process, but do not include alignment with the organization's mission.)
Which of the following items in the ticket can help the support team immediately determine the time sensitivity of resolving this issue? - Severity level - Detailed issue description - Tier assignment - Department assignment
Severity level
Which of the following are included in a network topology diagram? (Select two.) - A layout of all electrical wiring and components. - A layout of all plumbing and HVAC components. - A layout of server racks, cooling, and air circulation systems. - The location and IP addresses of hubs, switches, routers, and firewalls. - The relationship between remote locations and the WAN links that connect them.
The location and IP addresses of hubs, switches, routers, and firewalls. The relationship between remote locations and the WAN links that connect them. Reason: A network diagram provides a visual representation of the logical and physical layout of your network. A single diagram or a collection of diagrams can include the location and IP addresses of hubs, switches, routers, and firewalls. It can also show the relationship between remote locations and the WAN links that connect them.
What should you use to clean an inkjet printer's print heads? -The printer's cleaning function -Anti-static vacuum -Damp cloth -Denatured alcohol
The printer's cleaning function
Which of the following is true about negative pressure systems? - They filter out airborne particles. - They can bring in airborne particles, such as dust or smoke. - They force air out through windows, doors, and other openings. - They are more energy-effective than positive pressure systems.
They can bring in airborne particles, such as dust or smoke.
You work in the computer repair department of a large retail outlet. A customer comes in with a workstation that randomly shuts down. You suspect that the power supply is failing. What should you do first to troubleshoot the issue? - Use a multimeter to test the power supply's electrical properties. - Use a known good spare to swap with the existing power supply. - Use a power supply tester on the power supply. - Use a cable tester to check the power supply's connections.
Use a known good spare to swap with the existing power supply. A power supply tester is a custom multimeter used to test output from a PC power supply. The power supply tester has multiple connectors to test the output for each connector type. However, in this case, intermittent shutdowns are a common symptom of a failing power supply.
Which document outlines how to communicate standards, procedures, and baselines that help an employee perform their job safely and effectively? - User Education and Awareness Policy - Security Policy - Acceptable Use Policy (AUP) - Bring Your Own Device (BYOD) Policy
User Education and Awareness Policy Explanation: A User Education and Awareness Policy establishes content for mandatory end user training. The policy outlines how to communicate standards, procedures, and baselines that will help an employee to do their job safely and effectively. A BYOD, AUP, and User Education and Awareness Policy are often included in an organization's Security Policy.
Anna has submitted a ticket to resolve an issue with: • Customer's name and contact • Relevant information The operator requests more information about her work computer. SOLUTION: Anna decides to set a severity level to indicate the high priority of the issue and then sends information back to the operator about her computer, which includes the application experiencing the problem, the device's network ID, and the operating system. Does this action help resolve the ticketing system issue?
Yes. By setting a severity level, the support operator can quickly determine the time sensitivity of the issue and make priority adjustments. In addition, providing the correct detailed information about the work computer (including network ID, operating system, and application) is important for the operator to determine whether the problem is with the computer, network, or application.
Which of the following statements about cleaning LCD monitors and display devices is true? - You should power off your monitor and clean it with a lint-free dry cloth. - Most new monitors are self-cleaning and should not be cleaned using external methods. - Monitors are best cleaned while powered on in order to observe the effectiveness of your cleaning. - An LCD monitor is best cleaned using a lint rag and glass cleaner
You should power off your monitor and clean it with a lint-free dry cloth. Note from E: *Please* DO NOT use glass cleaner on plastic.