chapter 14 Flashcards

(22 cards)

1
Q

What is Active Listening?

A

A communication technique that involves allowing the customer to tell their whole story without interruption and occasionally interjecting small phrases to show understanding

This technique enhances customer engagement and satisfaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Open-ended Questions.

A

Questions that encourage the customer to provide a detailed explanation of what they were doing and what happened

These questions promote a deeper understanding of the customer’s situation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Closed-ended Questions?

A

Targeted questions designed to obtain specific factual information, often answerable with a simple ‘yes’ or ‘no’

Useful for clarifying specific details quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Service Level Agreement (SLA) mean?

A

A contract that defines the specific level of support a technician must provide to a customer

SLAs set expectations for service delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Personal Identifiable Information (PII).

A

Data that can be used to identify a specific individual, such as a full name, social security number, or biometric data

Protecting PII is crucial for privacy and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Payment Card Industry (PCI)?

A

A set of security standards designed to protect credit card account numbers and transaction data

Compliance with PCI standards is essential for businesses handling credit card transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does Protected Health Information (PHI) refer to?

A

Patient-related information, such as medical records and visit dates, which is strictly regulated by laws like HIPAA

PHI must be handled with care to ensure patient confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Computer Forensics?

A

The official process of collecting and analyzing data from computer systems for use as evidence in criminal investigations

This field combines law enforcement and IT expertise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Volatile Data.

A

Information stored in RAM or registries that is lost as soon as a computer is turned off

Volatile data is critical in forensic investigations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Chain of Custody?

A

The documented procedure of tracking evidence to ensure it has not been tampered with and remains admissible in court

Maintaining chain of custody is vital for legal proceedings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Script File?

A

A simple text file used to automate repetitive tasks or standard diagnostic processes on an operating system

Script files enhance efficiency in IT operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is building rapport with a customer important for troubleshooting?

A

A relaxed customer is more likely to provide the detailed information needed to identify and fix the problem

Establishing a good relationship can lead to more effective communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the primary goal of a Disaster Recovery Plan?

A

To describe how to restore IT operations quickly and keep critical functions running during or after a disaster

This plan is essential for business continuity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What should you do if you discover illegal activity on a customer’s computer?

A

Do not turn off the computer, as this could destroy volatile data, and follow your company’s official procedures for reporting it

Preserving evidence is crucial in such situations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between Persistent and Volatile data?

A
  • Persistent data: stored on a drive and remains when the power is off
  • Volatile data: in RAM and is lost when the power is cut

Understanding this distinction is important for data recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why do some technicians use a mirror at their desk in a call center?

A

To monitor their facial expressions, as a customer can often sense a smile through the technician’s tone and inflection

Non-verbal cues can enhance customer interactions.

17
Q

What is an example of an End User License Agreement (EULA)?

A

It is a personal software license that defines how a single user can use a specific piece of software

EULAs are important for legal use of software.

18
Q

What happens when a level one technician cannot solve a customer’s problem?

A

The problem is escalated to a level two technician for more advanced support

This ensures that customers receive the help they need.

19
Q

What are two things you should avoid doing when talking to a customer?

A
  • Using technical jargon or abbreviations
  • Arguing with or becoming defensive toward the customer

Clear communication is key to effective customer service.

20
Q

What is the purpose of Digital Rights Management (DRM) software?

A

It is designed to prevent unauthorized or illegal access to digital content and devices

DRM helps protect intellectual property.

21
Q

What information must be documented if you witness illegal activity on a network?

A
  • Time
  • Date
  • Connected peripherals
  • Network connections
  • Specific illegal material found

Accurate documentation is essential for investigations.

22
Q

How does a script file benefit an IT professional?

A

It saves time by automating the same task, such as a data backup, across many different computers

Automation increases efficiency in IT operations.