Core 2 (11/15-1/30) Flashcards
(135 cards)
You finish replacing the network adapter in a company workstation and verify full system functionality.
Using the six steps of troubleshooting, which step should you take next?
document findings, actions and outcomes
What are the six steps of troubleshooting?
1) Identify the problem
2) Establish a theory of probable cause
3) Test the theory
4) Establish a plan
5) Verify full system functionality
6) Document findings, actions, and outcomes
Which of these hazards does a surge suppressor protect against?
Power spikes
You complete a trouble ticket submitted by a client. Once the problem is corrected, you ask the customer to verify that the system works as expected.
The customer acknowledges that the computer is functional, but states that there is a dim flicker that occurs often enough that it is giving him a headache.
You tell the customer that this is a result of action that had to be taken to correct that original problem. However it should diminish over time and the customer’s headaches will then go away.
Which of the principles shown below did you violate?
Do not dismiss the customer’s problems.
Which backup type would you use to ensure all data is included in the scheduled backups?
Full
In what way do administrators use Windows PowerShell?
create and run scripts used to manage the operating system
Joe is attempting to repair an application on his computer. When he tries to start the program, the system returns a “DLL is missing” error message.
Joe imports a copy of the missing .dll file to his computer, but the program continues to return the error message and fails to start.
Which of the following tools should Joe use to complete the .dll import process?
regsrv32
You are troubleshooting a computer at a client’s site. The client is upset because a number of important files have disappeared from his Documents folder. The client is sure that the files were there two days ago and can think of no reason why they would have disappeared.
You can restore the missing files from a tape backup.
Using the theory of troubleshooting, what should you do next?
Establish a theory of probably cause
A customer has made several trouble calls to the help desk and is very irate. The technician that receives the call has learned that the issue has not yet been resolved. The technician politely asks the customer to explain the issue, and learns that the problem needs to be escalated. Which of the following should the technician do once the problem has been escalated?
communicate status with the customer and ensure a successful call transfer
A technician is onsite troubleshooting a user’s issue and receives a call from another customer. Which of the following is the best course of action for the technician to take in this situation?
let the call go to voicemail and respond when time permits
A computer is making a clicking noise, but is otherwise operating normally. What should you do first when responding to the issue?
Attempt to backup data from the hard drive
A user submits a trouble ticket to the help desk. In completing the ticket, the user states that the problem is related to a newly installed application. After reading the full description of the problem, you know that the problem is related to something completely different.
Instead of following the course of action that the user recommends, you try to persuade the user that your method will be best. This exchange results in some harsh words between you and the user.
How should you have responded to the user?
You should have acknowledged the customer’s input, and then resolved the problem using your own knowledge of the best way to proceed
What is the best way to deal with a difficult user?
Don’t allow yourself to be drawn into an argument or become defensive
Dan, a new help desk technician, is talking with a customer on the phone. The customer has a problem that Dan has never seen before and does not know how to troubleshoot.
What is the first thing that Dan should say to the customer?
“Please hold while I escalate this problem to a Level II technician.”
“Please be patient with me. This is the first time I have encountered this problem.”
“Please hold while I consult with one of our senior technicians about your issue.”
“Would you mind holding for no more than two minutes while I check our resources?”
“Would you mind holding for no more than two minutes while I check our resources?”
It also gives Dan time to see if there is a simple solution to the problem or if it might need to be escalated. Until Dan has a chance to ask another technician how to deal with the user’s problem, he doesn’t know if the problem should be escalated or not.
A user reports several technicians have been unable to solve a problem and requests that the technician on the phone comes out to fix the problem because the user is unable to work. After the technician has effectively communicated a willingness to help, which of the following is the next step?
identify the problem
A client needs to work on some critical files, but says she cannot find them.
Using the theory of troubleshooting, what step should you complete first to resolve the problem?
Identify the problem
A user calls the help desk to report a problem with a Windows computer. On the previous day, the user downloaded a new application from an approved share on the company’s network. Everything was working well yesterday.
This morning, when the user came in and restarted his computer, he received several messages which state that a DLL file that cannot be found.
You have been assigned to resolve this problem. What is the best course of action for you to take next?
Copy the DLL file from a working computer and use the regsvr32 command to import the file
In this case, it would appear that a needed .dll file was overwritten when the user downloaded and installed the new application. In order to fix the problem, you will need to restore the missing .dll by copying it from a trusted source and using the Regsvr32 utility to register the .dll file.
What is DLL?
(Dynamic Link Library) files are composed of computer data and code. These are used by software makers as shared resources on Windows operating systems. Rather than install separate components, they share the same DLL file.
What is Regsvr32?
a command-line utility to register and unregister OLE controls, such as DLLs and ActiveX controls in the Windows Registry. Regsvr32.exe is installed in the C:\Windows\System32 folder.
Ann, a user at your company, brings her laptop to you for repair. What is the least professional thing you could say or offer to Ann?
“The department is slammed with repairs right now. Would you be able to bring the laptop back a little later when we are less busy?”
“Now that I have your laptop checked in for repair, may I offer you the use of a loaner laptop?”
“Please have a seat in the area while I work on your laptop.”
“Your laptop will be ready later today. Please feel free to come by any time at your convenience and see if the machine is ready.”
“The department is slammed with repairs right now. Would you be able to bring the laptop back a little later when we are less busy?”
Why?
1. You failed to recognize that the user has a problem.
2. You ignored the inconvenience you are causing your coworker.
You are considering different methods for protecting the electronic devices on your company’s network. Which of the following devices will protect the equipment to which it is attached by directing power surges to the path of least resistance?
surge protector
What is a surge protector?
a device that re-directs power surges through an alternate path of least resistance (or to “ground”), protecting valuable electronic equipment. Surge protectors should be installed on any equipment that contains a microprocessor.
Read / Write errors are occurring intermittently on your PC. Which of the following actions would you MOST likely take?
Low level format the drive
Run FDISK on the drive
Update definitions and run a virus scan
Run CHKDSK on the drive
Run CHKDSK on the drive
You are installing a wireless router in your home. What are the two most important actions you could perform to ensure that your network is secured from access by unauthorized users? Select two.
Change the default login name and password on the new router
Verify that the router firmware has the latest updates installed
Modify the encryption settings on each workstation’s wireless adapter
Enable encryption on the new router
Harden all workstations on your network
Change the default login name and password on the new router
Enable encryption on the new router