click below
click below
Normal Size Small Size show me how
ITC 191
Quiz 1 (2.3-.4, 2.8-.9)
| Question | Answer |
|---|---|
| You are PC technician company. Employee has gone to meeting while you fix computer in her office. She accidentally left report open next to computer. Which of the following is BEST action to take? | Ignore paper and tell no one of its contents |
| As you arrive on-site to fix an issue, you are met by frantic employee who immediately details how critical the issue is and how important it is to fix it as quickly as possible. Having seen this issue many times, you say to customer, "Stop worrying" | Avoid dismissing customer problems |
| Which part of change management process specifies how you will return affected systems to their original state if your implementation fails? | Backout plan |
| Who needs to approve change before it's initiated? | Customer; Change board |
| Which section of change order form would include desired outcomes of a project? | Scope of change |
| Standard change order form | Purpose of change; Scope of change; risk analysis; backout plan |
| Which documents are generally finished and approved before a project begins? | Project plan; budget; risk assessment |
| Which part of change management process asks how project will align with organization's current mission? | Purpose of the change |
| Who does the term responsible staff member refer to? | The person who should be primary contact person for the project |
| You've been tasked with laying cables to connect the new space with the existing space. Which document should you look at to ensure that there will be no interference or damage to the cables from existing infrastructure? | Floor plan |
| Which of following are included in network topology diagram? | Location and IP addresses of hubs, switches, routers, and firewalls; Relationship between remote locations and the WAN links that connect them |
| Which of the following BEST describes Security Policy? | Document or collection of documents that provide information about an organization's network security |
| Which document outlines how to communicate standards, procedures, and baselines that help an employee perform their job safely and effectively? | User Education and Awareness Policy |
| You plan on including Employee Education and Awareness Policy training for all new employees. As part of that training, which of the following should you instruct your employees NOT to do as part of company procedures? | Connect unauthorized devices; Click on links in a phishing email; Respond to social engineering attacks |
| Which of the following documents might a new employee need to sign during the onboarding process? | Bring your own device policy; acceptable use policy |
| You are responsible for updating your company's onboard training for all new employees. Which of the following items are important to include in that training? | The process for reporting suspicious behavior; security policy; the help desk's contact information |
| Which of the following BEST describes the primary role of Tier 1 support operators? | They gather information about a problem and perform basic troubleshooting. |
| Which of the following is the process of tracking and managing an organization's asets? | Asset management |
| The hospital has purchase some new heart-rate monitoring devices that are IoT-enabled. Jason needs to add the devices to the inventory management database. Which of the following is the asset management phase that Jason is currently involved with? | Deployment |
| Candace is a purchasing manager for a large metropolitan hospital and is responsible for making purchasing decisions for millions of dollars worth of equipment each year. The hospital board has recently decided that many of the older hospital devices n | Determine goods and services required |
| During which asset management phase would you perform maintenance tasks, such as installing updates and patches or upgrading a hard drive? | Operations |
| During which asset management phase would you consider whether an asset would replace an existing one and whether it will have any impact on the existing network and users? | Procurement |
| Aaron is a system administrator for a school district and has been assigned to maintain and decommission computer equipment throughout the district schools. He has been assigned to review all the workstations currently being used by the administrative | Ensure that any sensitive or proprietary information was permanently removed from the workstations before selling them to the public |
| Your organization has expanded into an adjacent office. You've been tasked with laying cables to connect the new space with the existing space. Which document should you look at to ensure that there will be no interference or damage to the cables from exi | Floor plan |
| Which of the following are included in network topology diagram? | The relationship between remote location and the WAN links that connect them; Location and IP addresses of hubs, switches, routers, and firewalls |
| Which of the following BEST describes Security Policy? | Document or collection of documents that provide information about an organization's network security |
| Which document outlines how to communicate standards, procedures, and baselines that help an employee perform their job safely and effectively? | User Education and Awareness Policy |
| As a new IT system administrator for the company, you have been assigned to re-establish all of Jared's accounts, including network accounts, email, software, and VPN access. However, you discover that no accounts exist for Jared. What should have been do | The accounts should have been disabled instead of deleted |
| You plan on including Employee Education and Awareness Policy training for all new employees. As part of that training, which of the following should you instruct your employees NOT to do as part of company procedures? | Connect unauthorized devices; Respond to social engineering attacks; Click on links in phishing email |
| Which of the following are procedures that should be included when offboarding an employee? | Collect physical access items from the employee; Disable electronic access for the employee |
| Which of the following documents might a new employee need to sign during the onboarding process? | Acceptable Use Policy (AUP); Bring Your Own Device (BYOD) Policy |
| You are responsible for updating your company's onboard training for all new employees. Which of the following items are important to include in that training? | Process for reporting suspicious behavior; Security Policy; Help desk's contact information |