CompTIA (Operational Procedure)
Which of the following words is used to describe an environmental control system?
Correct answer: HVAC
HVAC refers to an environmental control system.
In the following scenario, what should he do to put out the fire?
After hearing the fire alarm in the network room, you see smoke flowing from a server. One of your coworkers is already attempting to calm it down with a pail of water as you yell and urge him to stop.
Correct answer: a fire extinguisher of class C
For electrical fires, special dry fire prevention or extinguishing chemicals, such as carbon dioxide, should always be used.
What situation is referred to by the phrase "brownout"?
Correct answer: Voltage drop (temporary)
The term "Brownout" refers to temporary drop in voltage.
What would be excluded from personally identifiable information (PII)?
Correct answer: Name of a high school teacher
Your address, first and last name, social security number, date of birth, and work details are included in personally identifiable information (Pll).
What exactly does the phrase "blackout" mean?
Correct answer: Power outage
Power outage refers to the term "Blackout".
In the following scenario, what special safety devices would be most appropriate for his environment?
After selling yourself as an IT consultant, one possible client calls you about multiple network design projects at his organization. There are tons of airborne particles afloat all the time in the factory where he works. He's curious about any unique considerations he should make when setting up his machines.
A device designed to provide emergency power in the event of a main power loss is known as:
Correct answer: UPS
A device designed to provide emergency power during an unexpected main power source outage is called UPS.
What is the best way to describe the objective of electrical grounding if you're the senior administrator and a new employee at the IT help desk has just started, and you've been tasked with showing him the ropes? While reviewing general safety procedures, the new employee inquires about the target of grounding electrical systems.
Correct answer: a method of removing unwanted electrical discharge from connected components
Grounding allows any excess electrical charges to be securely transported away from the equipment receiving the power. This prevents the electrical spike from destroying the linked gadget right away.
Which of the following solutions adds redundancy to places where single points of failure have been identified? (Choose all of the options that apply.)
Please select 3 correct answers
Correct answer: Uninterruptible Power Supply (UPS), RAID, Backup generator
The following solutions add(s) redundancy in areas identified as single points of failure.
If an engineer is looking for a Python script in a computer's documents folder, what file extension should he or she look for?
Correct answer: .py
A ".py" script is a script created in the Python programming language.
The following is a description of a device used to safeguard electrical devices from large voltage fluctuations:
Correct answer: Surge suppressor
A device designed to protect electronic devices from large voltage fluctuations is known as surge suppressor.
When Eddie overhears his IT manager arguing with a network administrator about how to properly dispose of computer equipment as he prepares to leave work for the day, what should you tell him? You explain how the administrator may easily refer to the safety data page (SDS) when the IT manager summons you to examine disposal instructions. The IT manager then inquires as to who is in charge of the SDS.
Correct answer: OSHA
Within the United States of America The Occupational Safety and Health Administration (OSHA) is in charge of overseeing and administering the SDS initiatives. If you have any questions or concerns about the SDS (previously MSDS), you should contact OSHA. Material safety data sheets (MSDS) are now referred to as "SDS" or "safety data sheets" as a result of OSHA's approval of a new Hazard Communication Standard (HCS) that is more closely tied to industry standards.
To clean the inside of a printer, which of the following tools would be used? (Choose all of the options that apply.)
Please select 2 correct answers
Correct answer: Can of compressed air & Toner vacuum
The following tools are used to clean the inside of a printer.
In the event that Ivan is cleaning out one of the old printers with a shop vacuum in the back room at work, what kind of vacuum should he use? You tell Ivan to stop using the shop vacuum as soon as you walk in, warning him that he could damage the printer components.
Correct answer: specialized anti-static vacuum
When operating inside computers or other electrical devices, only specialized vacuums should be utilized. Which are carefully designed to avoid causing damage to your electrical components.
The elements of the first response in circumstances , where users are identified in violation of policies pertaining to forbidden content or conduct should include: (Choose all of the options that apply.)
Please select 3 correct answers
Correct answer: Preservation of data and devices, Reporting via the appropriate channels, Identifying the issue
The elements of first response should include the following: Preservation of data and devices, Reporting via the appropriate channels, Identifying the issue
The executives have been contemplating how to avoid a repetition of a recent power outage that knocked the company offline for 30 minutes. During the planning and design stages, they enlist your help as an IT expert. According to one CEO, how can you tell how much a surge suppressor can withstand? So, what are your options for responding to him?
Correct answer: joule rating
The ability of a suppressor to handle a surge will be measured in joules. A higher rating in this area indicates that you'll be able to protect yourself more successfully from higher line voltages.
A chronological record outlining persons in possession of an evidence is referred to as ___________ in forensic processes.
Correct answer: Chain of custody
A chronological record outlining persons in possession of an evidence is referred to as a chain of custody.
What is the first step in successful incident response after an event report has been filed?
Correct answer: Confirm that a failure occurred.
The first step is to confirm that an incident has happened or is happening right now. You can go on to the next phase of the incident response procedure after you've recognized this.
The following is an example of a control access technique that protects against copyright infringement:
Correct answer: DRM
A type of control access technology providing protection against copyright infringement is called DRM.
What kind of license permits the general public to see the source code?
Correct answer: open source
Anyone with access to the source code for open source programs can alter and update it as they see fit. Allowing the public to study the software program and make changes based on the code itself, according to some, would result in a more robust piece of software.