Flashcards in Domain 5: Operation Procedures Deck (28)
Loading flashcards...
1
Which are equipment grounding methods? Choose three answers.
Choices:
A - Wall
B - Earth
C - Signal
D - Ceiling
E - Chassis
B - Earth
C - Signal
E - Chassis
2
Hard drives should be stored in which item when they are not in use?
Choices:
A - Computer
B - Antistatic bag
C - Cardboard box
D - Plastic container
B - Antistatic bag
3
Which is a self-grounding practice used while working on a computer?
Choices:
A - Wear a hazmat suit
B - Touch an antistatic bag
C - Stand on a non-metal surface
D - Touch the metal of the computer case once in a while
D - Touch the metal of the computer case once in a while
4
Which materials need to be properly disposed of as they are considered toxic? Choose three answers.
Choices:
A - Paper
B - Toner
C - Plastic
D - Batteries
E - CRT monitors
B - Toner
D - Batteries
E - CRT monitors
5
Which article of clothing should never be worn when working on the inside of a computer?
Choices:
A - Hat
B - Loose jewelry
C - Safety goggles
D - Long-sleeve shirt
B - Loose jewelry
6
Which is a proper lifting technique?
Choices:
A - Lift with the legs
B - Lift with the back
C - Lift with the arms
D - Bend over while lifting
A - Lift with the legs
7
A fire extinguisher with which rating will put out electrical fires?
Choices:
A - A
B - B
C - C
D - D
C - C
8
Which items should a technician wear to protect the face from particles and odors? Choose two answers.
Choices:
A - ESD mask
B - ESD goggles
C - Air filter mask
D - Safety goggles
C - Air filter mask
D - Safety goggles
9
An MSDS contains information for proper disposal of __________.
Choices:
A - gold
B - OSHA
C - platinum
D - potentially hazardous material
D - potentially hazardous material
10
Which temperature in Celsius is considered too high for most computers?
Choices:
A - 15 degrees
B - 25 degrees
C - 35 degrees
D - 45 degrees
D - 45 degrees
11
Which actions can cause ventilation problems in computers? Choose two answers.
Choices:
A - Dust
B - Light
C - Adding components
D - Removing components
A - Dust
C - Adding components
12
Surge suppressors protect against which item?
Choices:
A - Sag
B - Spike
C - Blackout
D - Brownout
B - Spike
13
Which devices should be used to clean an area of dust particles?
Choices:
A - Air masks
B - Air filters
C - Heat sinks
D - Enclosures
B - Air filters
14
Which types of equipment are subject to local government waste disposal regulations? Choose two answers.
Choices:
A - Cable
B - Modems
C - Monitors
D - Computers
C - Monitors
D - Computers
15
Which are the three steps a first responder will take in response to an incident?
Choices:
A - Identify
B - Data backup
C - Secure the premises
D - Data and device preservation
E - Report though proper channels
A - Identify
D - Data and device preservation
E - Report though proper channels
16
A member of the IT team is the first responder for a company incident. This is the first incident the technician has been involved with. Which item should the technician review while handling the incident?
Choices:
A - Escape plan
B - Phone numbers
C - Incident documentation
D - Passwords and certificates
C - Incident documentation
17
Tracking evidence involved in an incident is part of which item?
Choices:
A - Chain of custody
B - Device preservation
C - Incident identification
D - Use of documentation
A - Chain of custody
18
An IT supervisor wants to order enough Microsoft Office licenses to cover the entire list of end users in a company. Which type of license is the IT supervisor most likely to obtain?
Choices:
A - Open
B - Personal
C - Enterprise
D - Commercial
C - Enterprise
19
Which are examples of personally identifiable information? Choose three answers.
Choices:
A - Face
B - Nickname
C - Date of birth
D - VAL number
E - Home address
A - Face
C - Date of birth
E - Home address
20
Which is a reason to use proper language when talking about computers?
Choices:
A - It is universal
B - It is the only way to talk
C - It can help technicians who speak multiple languages
D - It will help users understand what the technician is doing
D - It will help users understand what the technician is doing
21
Active listening is the act of letting a customer or user finish what they are saying.
A - True
B - False
A - True
22
Which item should technicians pay close attention to when being culturally sensitive?
Choices:
A - Food
B - Sports
C - Stock market
D - Professional titles
D - Professional titles
23
Which items can distract a technician from a customer? Choose three answers.
Choices:
A - IP address
B - Social media
C - Text message
D - Server functionality
E - Phone call from a co-worker
B - Social media
C - Text message
E - Phone call from a co-worker
24
Which individuals will need to be notified if a technician finds private information out in the open? Choose two answers.
Choices:
A - Supervisor
B - Business owner
C - Technician's mother
D - Technician's subordinate
A - Supervisor
B - Business owner
25
Which items are associated with corporate policies and procedures? Choose three answers.
Choices:
A - Group Policy
B - Downtime policy
C - Acceptable use policy
D - Technical use process
E - Change management process
B - Downtime policy
C - Acceptable use policy
E - Change management process
26
Which is a part of establishing a theory of probable cause?
Choices:
A - Research
B - Networking
C - Troubleshooting
D - Tracking evidence
A - Research
27
Which actions should be taken if the original theory is not correct? Choose two answers.
Choices:
A - Escalate the issue
B - Establish a new theory
C - Establish probable cause
D - Figure out the steps needed to resolve the problem
A - Escalate the issue
B - Establish a new theory
28