CPT268 Chapter 14 Exam

Ace your homework & exams now with Quizwiz!

During computer forensics investigations, which type of data is lost when power is removed from the computer?

Data that is stored in RAM

What is a reason to escalate a problem from a level one technician to a level two technician?

When drivers, applications, or operating systems need to be installed.

Which type of documentation is concerned with specifying what data must be collected and how long it must be retained in regards to an organization?

Policies

A programmer used an operator to compare values within a program and the resulting logical data type was "false". Which test condition would have provided the result of "false"?

8 != 8

Which is true regarding the treatment of customer property?

A customer's phone list is customer property and must be kept private.

What is the definition of a script file?

A simple text file used to automate processes and tasks.

Which are two examples of good customer service? (Choose two.)

A technician follows up with a customer after services are completed and a technician notifies a customer as soon as possible that there may be a delay.

Which statement is characteristic of most personal software licenses?

A user is allowed to install the software on only one computer.

A technician receives a call from a customer who is too talkative. How should the technician handle the call?

Allow the customer to speak without interruption and then try to use closed-ended questions to gather data.

Which change management process component is concerned with the cost and resources necessary for implementation?

Assessment

Which two programming languages require the program to be converted into executable code using a compiler? (Choose two.)

C# and Java

What should a level two technician do immediately after receiving an escalated work order from a level one technician?

Call the customer back to ask any additional questions and resolve the problem.

Which task would require that a problem be escalated to a level two technician?

Changing the CMOS settings.

What are two examples of personally identifiable information (PII)? (Choose two.)

Credit card number and street address

What does a technician need in order to make changes to software installed on the computer of a customer?

Customer authorization

What is a common responsibility of a level one call center technician?

Entering a concise description of a customer problem into a ticketing system.

When performing computer forensics, what can be prevented with a properly and carefully documented chain of custody?

Evidence tampering

What is a typical task performed by a level one technician in a call center?

Gathering information when a customer calls for help.

What is a characteristic of the open source license of an application software?

It allows users to modify and share the source code.

Why is a chain of custody important in a cyber crime case?

It authenticates evidence.

Which statement best describes a call center?

It is a place that exists within a company and provides computer support to both employees and customers of the company.

A support desk trainer is teaching a new support desk technician some basic rules about starting a conversation with a customer. Which statement describes the rules the trainer should be teaching?

Learn the name of the customer and create a connection with the customer. Next ask questions that assess the knowledge level of the customer.

A customer is angry and calls to complain that the service scheduled on the computer took longer than expected. The technician reviews the work order and notices that the service was performed by a new employee. How should the technician respond?

Listen to the complaint and then apologize for any inconvenience caused by the lengthy service on the computer.

A worker in the records department of a hospital in the United States accidentally sends a patient's medical record to a printer in another department. When the worker arrives at the printer, the patient record printout is missing. Which two types of compliance standards best match the breach of confidentiality? (Choose two.)

PHI and ePHI

A technician is troubleshooting a PC in a workplace environment and finds many pirated movies on the hard drive. What should the technician do?

Report the findings through the proper channels.

A system administrator needs to perform manual updates on a remote Linux workstation using a Windows 10 PC. Which remote access tool should the administrator use to securely access and configure the Linux device across the network?

SSH Client

What two actions should a call center technician avoid when dealing with an angry customer? (Choose two.)

Spending time explaining what caused the problem and putting the customer on hold or transferring the call.

A technician is attempting to securely configure a Linux web server on the public-facing side of the firewall. What port type and number are most likely required to be open on the firewall to allow this traffic through?

TCP Port 22

What is the definition of cyber law?

The collection of international, country, and local laws that affect computer security professionals.

Which two rules pertain to the general daily activities of employees in a call center environment? (Choose two.)

The technician should be sure to treat all customers equally and the technician should contact the customer if the technician is going to be late for a follow-up appointment.


Related study sets

Greek and Roman mythology in the Harry Potter books Greek

View Set

Success in College and Life - Website Evaluation

View Set

N524 EAQ #6 Fundamentals Of Nursing: Fundamental Skills

View Set

Growth and Development peds final test

View Set

ATI Mobility & Tissue Integrity Quiz

View Set

Real Estate Appraisal: Income Approach to Value Part 2 Selecting an Overall Cap Rate

View Set

Texas report Form /Report Writing 4 hr

View Set

What was the point of the British Empire?

View Set