Back to AI Flashcard MakerInformation Technology /CompTIA A+ 220-1001 & 220-1002 A+ 1002: CH28 Review

CompTIA A+ 220-1001 & 220-1002 A+ 1002: CH28 Review

Information Technology11 CardsCreated 3 months ago

This flashcard set focuses on IT documentation and professional practices from Chapter 28 of the CompTIA A+ 220-1002 exam, emphasizing tools like incident documentation for tracking recurring issues and improving support efficiency.

Tracking specific problems through ______ helps current and future techs deal with problematic hardware and individuals?

incident documentation
personal logs
a troubleshooting log
an acceptable use policy

incident documentation

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/11

Key Terms

Term
Definition

Tracking specific problems through ______ helps current and future techs deal with problematic hardware and individuals?

incident documentation
personal logs
a troubleshooting log
an acceptable use policy

incident documentation

Use ______ to protect against power spikes?

uninterruptible power supply
surge protector
charge protector
RFID chip

surge protector

Techs help organizations institute _______ practices to protect company assets. These include barcodes and asset tags on items, among other things?

inventory management
regulatory compliance
acceptable use
change management

inventory management

A ______ provides a map for how everything connects in an organization’s network?

organization chart
Venn Diagram
network topology diagram
asset map

network topology diagram

Verifying a backup is also called ______?

backup testing
remediation
account recovery
software testing

backup testing

_______ provides options for getting access to your old password or resetting the account to a temporary password; users will change to a permanent password upon first login?

Workgroup Recovery
System Recovery
Account Recovery
Security Recovery

Account Recovery

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

Tracking specific problems through ______ helps current and future techs deal with problematic hardware and individuals?

incident documentation
personal logs
a troubleshooting log
an acceptable use policy

incident documentation

Use ______ to protect against power spikes?

uninterruptible power supply
surge protector
charge protector
RFID chip

surge protector

Techs help organizations institute _______ practices to protect company assets. These include barcodes and asset tags on items, among other things?

inventory management
regulatory compliance
acceptable use
change management

inventory management

A ______ provides a map for how everything connects in an organization’s network?

organization chart
Venn Diagram
network topology diagram
asset map

network topology diagram

Verifying a backup is also called ______?

backup testing
remediation
account recovery
software testing

backup testing

_______ provides options for getting access to your old password or resetting the account to a temporary password; users will change to a permanent password upon first login?

Workgroup Recovery
System Recovery
Account Recovery
Security Recovery

Account Recovery

Use ______ to protect against power dips and blackouts?

uninterruptible power supply
surge protector
charge protector
RFID chip

uninterruptible power supply

A ______ enables organizations to implement changes to IT infrastructure in a safe and cost effective manner?

change management process
scope management process
risk management process
change board

change management process

The ______ consists of techs, representatives from management, IT Security, and administration who review the change documentation and either approve or deny the changes?

board of directors
IT board
regulatory board
change board

change board

_______ backup means backing up a complete volume - including the OS, boot files, all installed applications, and all data?

Image-Level
File-Level
Volume-Level
System-Level

Image-Level

A ______ RFID tag uses a battery or external power source to send out and receive signals?

passive
active
automatic
coded

active