CompTIA A+ 220-1001 & 220-1002 A+ 1002: CH28 Review
This flashcard set focuses on IT documentation and professional practices from Chapter 28 of the CompTIA A+ 220-1002 exam, emphasizing tools like incident documentation for tracking recurring issues and improving support efficiency.
Tracking specific problems through ______ helps current and future techs deal with problematic hardware and individuals?
incident documentation
personal logs
a troubleshooting log
an acceptable use policy
incident documentation
Key Terms
Tracking specific problems through ______ helps current and future techs deal with problematic hardware and individuals?
incident documentation
personal logs
a troubleshooting log
an acceptable use policy
incident documentation
Use ______ to protect against power spikes?
uninterruptible power supply
surge protector
charge protector
RFID chip
surge protector
Techs help organizations institute _______ practices to protect company assets. These include barcodes and asset tags on items, among other things?
inventory management
regulatory compliance
acceptable use
change management
inventory management
A ______ provides a map for how everything connects in an organization’s network?
organization chart
Venn Diagram
network topology diagram
asset map
network topology diagram
Verifying a backup is also called ______?
backup testing
remediation
account recovery
software testing
backup testing
_______ provides options for getting access to your old password or resetting the account to a temporary password; users will change to a permanent password upon first login?
Workgroup Recovery
System Recovery
Account Recovery
Security Recovery
Account Recovery
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
Tracking specific problems through ______ helps current and future techs deal with problematic hardware and individuals? incident documentation | incident documentation |
Use ______ to protect against power spikes? uninterruptible power supply | surge protector |
Techs help organizations institute _______ practices to protect company assets. These include barcodes and asset tags on items, among other things? inventory management | inventory management |
A ______ provides a map for how everything connects in an organization’s network? organization chart | network topology diagram |
Verifying a backup is also called ______? backup testing | backup testing |
_______ provides options for getting access to your old password or resetting the account to a temporary password; users will change to a permanent password upon first login? Workgroup Recovery | Account Recovery |
Use ______ to protect against power dips and blackouts? uninterruptible power supply | uninterruptible power supply |
A ______ enables organizations to implement changes to IT infrastructure in a safe and cost effective manner? change management process | change management process |
The ______ consists of techs, representatives from management, IT Security, and administration who review the change documentation and either approve or deny the changes? board of directors | change board |
_______ backup means backing up a complete volume - including the OS, boot files, all installed applications, and all data? Image-Level | Image-Level |
A ______ RFID tag uses a battery or external power source to send out and receive signals? passive | active |