1.
Which two actions should a technician take if illegal content, such as child pornography, is discovered on the hard drive of a customer computer?
Correct Answer(s)
A. Contact a first responder.
D. Document as much information as possible.
Explanation
If illegal content, such as child pornography, is discovered on a customer's computer, the technician should take two actions. Firstly, they should contact a first responder, such as the local law enforcement agency, to report the illegal content and seek their guidance on further steps to be taken. Secondly, the technician should document as much information as possible about the content, including file names, locations, and any other relevant details. This documentation will be crucial for the authorities' investigation and prosecution process. Removing and destroying the hard drive is not recommended as it may interfere with the investigation and tamper with evidence.
2.
What is the definition of cyber law?
Correct Answer
D. The collection of international, country, and local laws that affect computer security professionals
Explanation
Cyber law refers to the collection of international, country, and local laws that affect computer security professionals. This includes laws related to computer crimes, data protection, privacy, intellectual property, and other legal issues that arise in the context of cyberspace. It is important for computer security professionals to be aware of and comply with these laws in order to ensure the legal and ethical use of technology and protect against cyber threats.
3.
When performing computer forensics, what can be prevented with a properly and carefully documented chain of custody?
Correct Answer
C. Evidence tampering
Explanation
A properly and carefully documented chain of custody in computer forensics helps prevent evidence tampering. This is because the chain of custody establishes a clear record of who has had access to the evidence and when, ensuring that it remains intact and unaltered throughout the investigation process. By documenting the movement and handling of the evidence, it becomes easier to identify any unauthorized modifications or tampering attempts, thus maintaining the integrity and reliability of the evidence for legal proceedings.
4.
During the process of troubleshooting, a technician gains access to customer private information. What is expected that the technician does with this information?
Correct Answer
E. Keep it confidential.
Explanation
The technician is expected to keep the customer's private information confidential. This means that the technician should not share or disclose the information to anyone else, including the manager or any other parties. Keeping the information confidential is important to maintain the customer's privacy and trust.
5.
Refer to the exhibit. During the troubleshooting of software that is installed on a computer system, a level one technician requires help from a level two technician. The file shown in the exhibit must be sent to the level two technician. How should the level one technician deliver this file?
Correct Answer
C. Replace all passwords in the file with before emailing the file and then supply the passwords by secure means, if required.
Explanation
The level one technician should replace all passwords in the file before emailing it to the level two technician and then provide the passwords through a secure method if necessary. This ensures that sensitive information is protected and prevents unauthorized access to the file.
6.
What are two sections that are usually included in an SLA?
Correct Answer(s)
A. Supported equipment and software
D. Time of service availability
Explanation
An SLA, or Service Level Agreement, typically includes two main sections: supported equipment and software, and time of service availability. The supported equipment and software section outlines the specific devices, systems, or software that the service provider will support and maintain. This helps establish the scope of services provided. The time of service availability section specifies the hours or timeframes during which the service provider will be available to provide support or assistance. This ensures that both parties have a clear understanding of when the service can be accessed.
7.
Which two rules pertain to the general daily activities of employees in a call center environment?
Correct Answer(s)
A. The technician should contact the customer if the technician is going to be late for a follow-up appointment.
C. The technician should be sure to treat all customers equally.
Explanation
The two rules that pertain to the general daily activities of employees in a call center environment are: 1) The technician should contact the customer if the technician is going to be late for a follow-up appointment, to ensure proper communication and maintain customer satisfaction. 2) The technician should be sure to treat all customers equally, emphasizing the importance of providing fair and unbiased service to all customers, regardless of personal preferences or opinions. These rules highlight the importance of professionalism, effective communication, and customer-centric approach in a call center environment.
8.
Which statement describes a best practice related to time management?
Correct Answer
D. The technician should make sure to call the customer back as close to the callback time as possible.
9.
Which two statements are correct about level one and level two technicians?
Correct Answer(s)
A. Level two technicians usually respond to the “down calls” as they may be able to resolve them faster.
D. Level two technicians are usually more knowledgeable about technology than the level one technicians are.
Explanation
Level two technicians usually respond to the "down calls" as they may be able to resolve them faster. This implies that level two technicians have a higher level of expertise and experience, allowing them to handle urgent issues efficiently. Additionally, level two technicians are usually more knowledgeable about technology than level one technicians. This suggests that level two technicians possess a deeper understanding of complex technical problems and are equipped to provide advanced troubleshooting and support.
10.
What should a level two technician do immediately after receiving an escalated work order from a level one technician?
Correct Answer
A. Call the customer back to ask any additional questions and resolve the problem.
Explanation
After receiving an escalated work order from a level one technician, a level two technician should immediately call the customer back to ask any additional questions and resolve the problem. This step is important as it allows the level two technician to gather more information about the issue directly from the customer, which can help in understanding the problem better and finding an appropriate solution. By directly contacting the customer, the level two technician can provide prompt support and ensure customer satisfaction.
11.
A customer calls to report a computer problem. Which two actions can the technician take to establish a good rapport with the customer?
Correct Answer(s)
B. Allow the customer to speak without interruption.
D. Refer to the customer by name whenever possible.
Explanation
The technician can establish a good rapport with the customer by allowing them to speak without interruption. This shows that the technician values the customer's input and wants to fully understand their problem. Additionally, referring to the customer by name whenever possible adds a personal touch to the conversation and helps create a friendly and personalized interaction.
12.
What is the correct way to conduct a telephone call to troubleshoot a computer problem?
Correct Answer
D. Maintain professional behavior at all times.
Explanation
The correct way to conduct a telephone call to troubleshoot a computer problem is to maintain professional behavior at all times. This means being polite, patient, and respectful towards the customer. It is important to listen actively to the customer's problem, ask relevant questions to gather information, and provide clear explanations of each step in the troubleshooting process. By maintaining professional behavior, the technician can create a positive and productive environment for resolving the computer problem efficiently.
13.
A technician receives a call from a customer who is too talkative. How should the technician handle the call?
Correct Answer
B. Allow the customer to speak without interruption and then try to use closed-ended questions to gather data.
Explanation
The technician should allow the customer to speak without interruption and then try to use closed-ended questions to gather data. This approach shows respect for the customer's need to talk and allows them to provide all the necessary information. Using closed-ended questions helps to gather specific information efficiently and keeps the conversation focused.
14.
What are two examples of displaying professional communication skills while talking to a customer?
Correct Answer(s)
B. Clarifying what customers say after they have finished their explanations
D. The use of active listening, with occasional interjections such as “I see” or “I understand”
Explanation
Two examples of displaying professional communication skills while talking to a customer are clarifying what customers say after they have finished their explanations and the use of active listening, with occasional interjections such as "I see" or "I understand". Clarifying what customers say after they have finished their explanations shows that you are actively engaged in the conversation and are making sure you fully understand their needs. Using active listening techniques, such as interjections, demonstrates empathy and shows the customer that you are paying attention to their concerns.
15.
What are three pieces of information a level one technician should gather from a customer?
Correct Answer(s)
A. Details of any recent changes to the computer
B. Description of the problem
F. Contact information
Explanation
A level one technician should gather details of any recent changes to the computer in order to identify any potential causes or conflicts related to recent updates or installations. They should also gather a description of the problem to understand the specific issue the customer is facing. Additionally, contact information is necessary to ensure effective communication and follow-up with the customer.
16.
Which situation would require that a support desk call be given the highest priority?
Correct Answer
B. The company cannot operate because of a system failure.
Explanation
The highest priority for a support desk call would be given when the company cannot operate due to a system failure. This situation indicates that the entire company's operations are impacted and immediate resolution is necessary to restore functionality. Operating system errors, login issues, application enhancement requests, and RAM memory upgrade requests may be important but do not have the same level of urgency as a system failure that hinders the entire company's operations.
17.
Which two data storage locations contain persistent data that can be used by computer forensics specialists?
Correct Answer(s)
A. Solid state drives
D. Hard disk drives
Explanation
Solid state drives and hard disk drives are the two data storage locations that contain persistent data that can be used by computer forensics specialists. Both of these storage devices retain data even when the computer is powered off, making them valuable sources of evidence for forensic investigations. CPU registers, RAM, and cache, on the other hand, are volatile storage locations that do not retain data once the power is turned off, making them less useful for forensic analysis.
18.
In a computer forensics investigation, which type of data is considered volatile data and can be lost if power is removed from the computer?
Correct Answer
A. Data in transit between RAM and the CPU
Explanation
Volatile data refers to data that is stored temporarily in RAM (Random Access Memory) and is constantly changing. This data includes processes, network connections, open files, and other system information. When power is removed from the computer, the data in transit between RAM and the CPU is lost because RAM requires power to maintain its contents. On the other hand, data stored on internal or external drives, as well as data stored on magnetic disks, is non-volatile and will not be lost when power is removed.
19.
What customer support procedure would likely cause an upset customer to become more upset?
Correct Answer
A. Ask the customer to do obvious or unnecessary steps.
Explanation
Asking the customer to do obvious or unnecessary steps would likely cause an upset customer to become more upset. This is because it can be frustrating and time-consuming for the customer to perform tasks that are unnecessary or that they have already tried. It can make them feel like their time is being wasted and that the support representative is not understanding or addressing their issue effectively. This can escalate their frustration and lead to increased dissatisfaction with the customer support experience.
20.
What name is given to a certain set of general rules that apply to written communication over the Internet?
Correct Answer
D. Netiquette
Explanation
Netiquette refers to a certain set of general rules that apply to written communication over the Internet. It is a combination of the words "Internet" and "etiquette," emphasizing the importance of polite and respectful behavior in online interactions. Netiquette guides individuals on how to communicate effectively, avoid misunderstandings, and maintain a positive online environment. It covers aspects such as proper language usage, avoiding spam, respecting privacy, and being mindful of others' feelings. Netiquette helps foster a sense of community and promotes healthy online interactions.
21.
When performing computer forensics what is required to prove a chain of custody?
Correct Answer
C. Proper documentation procedures
Explanation
To prove a chain of custody in computer forensics, proper documentation procedures are required. This involves maintaining a detailed record of the handling, storage, and transfer of evidence. It ensures that the evidence remains intact and uncontaminated, and that there is a clear and documented trail of custody from the time it is collected until it is presented in court. This documentation is crucial in establishing the authenticity and reliability of the evidence, and to demonstrate that it has not been tampered with or compromised.
22.
What is a reason to escalate a problem from a level one technician to a level two technician?
Correct Answer
C. When drivers, applications, or operating systems need to be installed
Explanation
When drivers, applications, or operating systems need to be installed, it may require a higher level of technical expertise and access to administrative privileges. Level two technicians typically have more advanced knowledge and skills in installing and configuring software components. Therefore, escalating the problem to a level two technician ensures that the installation process is handled correctly and efficiently.