Operational Procedures Flashcards
You work for a medium-sized company. You would like to provide secure, remote access between the company’s three Internet-connected sites and their Windows client, servers, and domain controllers. Which option would provide adequate security and cost the least overall?
A) Purchase WAN links between each pair of sites, and run a commercial VPN over IPSec.
B) Use a freeware VNC to run TeamViewer over the Internet.
C) Create a VPN, and run RDP over the VPN.
D) Use IPSec to secure RDP over the Internet with connection security rules and associations.
You should use Internet Protocol Security (IPSec) to secure Remote Desktop Protocol (RDP) over the Internet with connection security rules and associations because it uses only Microsoft-supplied protocols and services. This is the only option that provides an additional layer of encryption and security beyond what is included in RDP or Windows Remote Desktop Connections. The connection security rules and associations work with IPSec to establish how to broker a legitimate RDP connection and to manage proofs of identity and authentication between communicating parties.
A user has contacted you requesting help with an operating system configuration issue. From your computer, you configure an Offer Remote Assistance invitation. What is a valid reason for not being able to create a Remote Assistance connection to the user’s computer?
A) Your user account is not a member of the Power Users group on the user’s computer.
B) Your user account is not a member of the Administrators group on your computer.
C) Your user account is not a member of the Power Users group on your computer.
D) Your user account is not a member of the Administrators group on the user’s computer.
To be able to establish a Remote Assistance session, your user account must be a member of the Administrators group on the user’s computer or be configured as a member of the Remote Assistance Helpers group in Group Policy.
Which factors would generate and promote the transmission of electrostatic discharge (ESD) to devices? (Choose all that apply.)
A) moving people
B) humidity below 40%
C) improper grounding
D) humidity above 40%
E) moving machines
The factors that generate and promote the transmission of ESD are moving machines, moving people, improper grounding, and humidity below 40 percent.
You are an IT technician for a company. You are required to implement Cat5 cabling for your company’s network. The cable will run to each user workstation along the floor. What should you do to secure the cable?
A) Implement a wireless network.
B) Install cables using a protective channel.
C) Use duct tape to secure the cable.
D) Install Cat6 cable instead of Cat5 cable.
You should install cables using protective channels because this will secure the cable from direct physical damage. Cables lying on a floor are vulnerable to damage by user movement. Therefore, you should implement a cable to user workstation using a protective channel.
You should not implement a wireless network because this is an expensive solution in comparison to implementing protective channels around a Cat5 cable.
While servicing a computer at a customer location, you notice a memo regarding an upcoming secret merger that will affect the customer’s publicly traded stock. What should you do?
A) Make a copy of the memo, and sell the memo to the press.
B) Keep the information confidential.
C) Tell your friends about the upcoming merger.
D) Contact your stockbroker and purchase the company’s stock.
An IT technician should never divulge a customer’s confidential data that is learned while servicing a computer at the customer location. Any confidential information that is discovered should be kept confidential.
You are a desktop administrator for Nutex Corporation. A user in the human resources department is unable to open the browser on their computer. You go to the customer’s desk to troubleshoot the problem. While you are there, you notice confidential documents regarding an employee’s recent disciplinary action sitting next to the keyboard.
What should you do?
A) Read the information on the document, and inform your co-workers of its contents.
B) Turn the documents over.
C) Read the information on the document, but keep the information confidential.
D) Store the papers in a drawer.
You should turn the documents over. This will keep the documents in the same place as the customer left them, but will prevent you from reading the confidential contents. This shows respect to the customer’s property while ensuring confidentiality.
You detect the humidity of your server room fluctuating towards the lower side.
What could be the possible effect of low humidity in server room?
A) power fluctuations
B) corrosion
C) electric shock
D) static electricity
Low humidity in the server room can cause static electricity. Static electricity is mainly caused in dry conditions when two dissimilar objects come in contact with each other. This electricity travels through the body and a spark is produced on the fingertips when the person touches something. Static electricity can cause severe damage to electronic computer components, such as the motherboard, hard disk, and random access memory. Therefore, the humidity level in the server room should not be low. Organizations can install a humidifier to maintain the correct level of humidity in the room. Technicians working with internal computer components can also wear anti-static wristbands to prevent damage from static electricity.
All of your telephone support technicians are trained in proper telephone etiquette, but you notice that sometimes you overhear some of them not following all of the techniques suggested. In your weekly team meeting, what can you recommend that they NOT do when dealing with an aggressive customer?
A) Paraphrase what the customer said.
B) Ask for clarification.
C) Ask what would make the situation better.
D) Match the customer’s tone of voice.
They should NOT match the customer’s tone of voice when dealing with an aggressive customer. This would only escalate the situation. You should lower your tone of voice because this tends to help calm the aggressive person.
While servicing some computer equipment, you overhear a conversation about company-wide pay raises. What should you do?
A) Tell your co-workers about the pay raise.
B) Tell your supervisor about the pay raise.
C) Keep the information confidential.
D) Send an anonymous e-mail to all company employees about the pay raise.
Professional behavior and ethics dictates that any confidential information you overhear should be kept confidential. You should never inform anyone, even someone affected by the information, of the details of the confidential information.
You need to configure your Windows 10 computer so that it automatically connects to the Research share on a server named Srv1 each time your computer boots. You want this to be configured as the R drive.
You click Start and Computer. You select the Map Network Drive option. The Map Network Drive dialog box is displayed. What should you do?
A) In the Drive field, select R. In the Folder field, enter \Research\Srv1. Select the Reconnect at Logon option. Click Finish.
B) In the Drive field, select R. In the Folder field, enter \Research\Srv1. Clear the Reconnect at Logon option. Click Finish.
C) In the Drive field, select R. In the Folder field, enter \Srv1\Research. Clear the Reconnect at Logon option. Click Finish.
D) In the Drive field, select R. In the Folder field, enter \Srv1\Research. Select the Reconnect at Logon option. Click Finish.
You should select R in the Drive field, enter \Srv1\Research in the Folder field, select the Reconnect at Logon option, and click Finish.
When explaining new equipment features to a non-technical customer, all of the following are acceptable practices, EXCEPT:
A) Use the correct acronyms with the customer.
B) Avoid interrupting the customer.
C) Sit beside the customer.
D) Make direct statements to the customer.
When communicating with a customer, you should NOT use acronyms or technical jargon. Customers may not understand these terms and will be frustrated because you used them. You should also avoid using technical jargon or slang.
You are the desktop technician for your company. Your company has a strict security policy in place. While troubleshooting the computer issue, you discover that a user has given her password to two co-workers in her department at the request of her supervisor. This is in direct violation of the company’s security policy.
What should you do?
A) Tell the user to change her password and to keep it a secret.
B) Explain the company security policy to the supervisor.
C) Explain the company security policy to the user.
D) Inform your supervisor of the department’s violation of the security policy.
You should inform your supervisor of the department’s violation of the security policy. It is always best practice to inform your supervisor of any security issues and let your supervisor address the situation.
You are a technician working at a client’s residence, and you leave some wires uncovered. A child comes in contact with the uncovered wires and is electrocuted. You rush to help the child.
What should you do FIRST?
A) Give cardiopulmonary resuscitation to the child.
B) Take the child to a doctor.
C) Pull the child away from the wires.
D)Turn off the power supply.
In this scenario, you should first turn off the power supply. Turning off the power supply will ensure that no further damage is caused to the child because of the flow of electricity.
You should not pull the child away from the wires first because this action might also bring you in contact with electricity. To avoid this, you should first turn off the power supply and then pull the child away from the wires.
You should not give cardiopulmonary resuscitation (CPR) to the child first. CPR should be administered to the child only after the child’s contact with electricity has been removed and you have determined they are not breathing. This ensures that the person administering CPR to the child does not come in contact with electricity and even the child is saved from any further caused due to electricity.
Before taking the child to a doctor, you should first pull the child away from wires. After you have pulled the child away from the wires, you must administer CPR to the child if they are not breathing, because an electric shock can cause a heart arrest causing death. After administering CPR, the child should be taken to the doctor for further medical treatment.
You know the IP address of a computer that is downloading copyrighted material. Which of the following would help you identify the location of that computer?
A) Knowledge base/articles
B) Password policy
C) Network topology diagrams
D) Acceptable use policy
If you know the IP address of the computer, the network topology diagram should assist with determining the physical location. The network topology diagram would document the physical location of nodes on the network. It could also detail IP addresses, VLANs, and subnets.
You arrive at a customer’s home to fix a computer. The computer is located in the bedroom of the customer’s 8-year-old daughter. While attempting to fix the problem, the child repeatedly interrupts you and asks questions.
What should you do?
A) Tell the child to leave you alone while you are working.
B) Ask the parent to take the child into another room while you are working.
C) Move the computer into another room where the parent is located.
D) Take the computer back to your office to complete the repair.
If a child or pet is causing distractions while you are working, you should never take it upon yourself to remove the distraction. You should always ask the parent to take the child into another room.
A user informs you that he cannot complete a task for his supervisor without an administrative password. The user will only have to complete this task once.
What should you do to achieve the objective using the least administrative effort?
A) Create a temporary administrative account for the user. Delete the account after the task is complete.
B) Tell the user to ask his supervisor for the supervisor’s account information.
C) Change the user’s account to an administrative level account. Return the account to its original state after the task is complete.
D) Enter the administrative credentials yourself at the user’s computer.
You should walk down to the user’s desktop and specify the administrative credentials yourself that are required for completing the task. Once the task is complete, you should then log out.
You have been assigned a troubleshooting job for a user in the human resources department. When you arrive, you notice that a spreadsheet that contains confidential employee information is open on the user’s computer. What should you do?
A) Close the spreadsheet.
B) Minimize the spreadsheet.
C) Leave the spreadsheet alone as long as the user is present.
D) Ask the user to close the spreadsheet.
You should ask the user to close the spreadsheet. Professional behavior dictates that you should respect the user and the user’s property. You should ask the customer to close all confidential computer documents and put away all confidential printed documents to ensure that you do not inadvertently obtain any confidential information. Asking the user to perform the function ensures that the customer is not offended by your actions and that you do not accidentally cause data loss.
It has been requested that your team make a significant change to the organization’s network infrastructure. Which type of documentation contained in the change plan would allow you to recover if you see that things are not going as hoped?
A)Backout or rollback plan
B)Documented business processes
C)End-user acceptance
D)Purpose of the change
Before implementing the change, you should look for a backout or rollback plan that would allow you to recover should something go awry. When you see that the implementation is not going as planned, the backout plan will allow you return the systems to an operational state. Rollback plans should be thoroughly documented to ensure that when it is necessary to roll back, you are reverting to the proper point. When implementing any change, you should document the date and time when the change was approved and implemented. This enables IT teams to identify when changes were last made to a device or application if a change has begun causing problems so they can roll back the change to the appropriate backup timestamp.
You work in a part of the country where thunderstorms and lightning are frequent and severe. A key computer was severely damaged by a nearby lightning strike, frying the motherboard and damaging the hard drive. For the future, what might you include in your update to the disaster prevention manual?
A) Account recovery options
B) UPS
C) Critical application
D) Surge suppression
A surge suppressor protects against lightning strikes, voltage spikes, and surges from when the power comes back on after an outage. A multi-outlet power strip may or may not have a surge suppressor built into it, so exercise caution when choosing a power strip.
Cathy is opening the case of a computer to add some memory and perform some additional maintenance. She wants to ensure that a static charge is not built up in her body. How can she proceed safely?
A) She should connect her grounding strap to the system board.
B) She should connect her grounding strap to a line voltage source.
C) She should unplug the computer.
D) She should use an ESD strap.
Cathy should wear an electrostatic discharge (ESD) strap to prevent damage to computer components from static charges built up in her body.
Unplugging a computer will not prevent static charges from building up in her body. However, to protect the computer from ESD, you should unplug the computer before performing any maintenance.
The buildup of static electricity on a person wearing synthetic fabric can easily reach 21,000 volts. Whereas a buildup of approximately 750 volts of static electricity is necessary to produce a visible spark, a buildup of only 10 volts can cause damage to computer components. Therefore, ESD can damage components at energy levels too low to be perceptible by human senses. Even if static discharges do not destroy a computer chip, they may decrease the life of the chip.
You want to prevent your computer from any type of electrostatic discharge (ESD) while servicing the computer. Which actions should you NOT perform while servicing the computer? (Choose two.)
A) Keep your one hand in contact with bare metal frame of computer at all times.
B) Ensure that the room in which computer is serviced is cool and dry.
C) Wear cotton clothes.
D) Ensure that the room in which computer is serviced is carpeted.
E) Wear an anti-static wristband.
To prevent ESD, you would NOT ensure that the room in which computer is serviced is carpeted or that the room is cool and dry. Carpets are known to be conductors of ESD and should never be placed in computer rooms. Cool and dry conditions are prone to generating static electricity. To prevent ESD, humidity in the server room should be maintained between 40 and 60%. Below 40% allows the generation of static electricity, and above 60% may allow the development of condensation on equipment.
Metroil, Inc. uses custom software to monitor industrial equipment used in its manufacturing facilities nationwide. As the Azure administrator, you have been asked to add this software to multiple Windows Server virtual machines. The software requires several Windows Server features to be installed as well as a few registry modifications.
You have decided that you can streamline this process by using PowerShell’s Desired State Configuration (DSC) capabilities. You have created the DSC configuration script on-premises in PowerShell ISE, and are ready to test it on the Azure VM named Monitor1.
You need to complete the appropriate steps for this task. You plan to perform three steps:
- (MISSING)
- Run the Publish-AzureVMDscConfiguration cmdlet with parameter values.
- Apply the DSC to the Monitor1 VM using the Set-AzureVMDscConfiguration cmdlet.
Which action should you perform for the first step that is marked with the MISSING graphic?
A) Save the script with a .py extension.
B) Save the script with a .js extension.
C) Save the script with a .ps1 extension.
D) Save the script with a .sh extension.
You will save the script with a .ps1 extension. A .ps1 file is a text that contains a series of PowerShell commands that can be run from the PowerShell prompt. In this scenario, you are creating a PowerShell script that will use several PowerShell commands to create the Desired State Configuration (DSC) that will optimize the configuration of virtual machines.
You work in a multinational organization. Your colleagues in Germany ask how you are doing with meeting the requirements of GDPR. To what do they refer?
A) Password policy
B) Regulatory and compliance policies
C) Knowledge base/articles
D) Incident documentation
They are referring to regulatory and compliance policies. Any company doing business in the European Union, or that handles the personal data of EU citizens in any location, must comply with the General Data Protection Regulation (GDPR). A strong regulatory and compliance policy should ensure that the organization’s policies and procedures are consistent with local, national, and international regulations.
You remove the toner cartridge from a laser printer. What should you do with it?
A) Deposit it in a municipal trash bin.
B) Refill it with general-purpose toner.
C) Return it to the manufacturer for recycling.
D) Send it to a standard plastic recycling center.
You should return the empty toner cartridge to the manufacturer for recycling. Laser printers use toner cartridges that can usually be refurbished and refilled by the manufacturer. The toner in a particular brand or model of cartridge has a specific formulation, and using a cartridge with the wrong toner may ruin your printer.
Toner cartridges, circuit boards, batteries, and other computer components typically include recommendations from the manufacturers regarding any special requirements they may have for recycling or disposal.