4.0 Operational Proceedures Flashcards
What are Network topology diagrams?
Network Topology diagrams that illustrate or describe the layout of the topology.
THEY MAY be logical, physical, or both.
What are Knowledge base/articles
External sources for data about known issues
including: Vendor/manufacturer knowledge base and Internet communities
What is Incident documentation?
A support tool kit is a tracking database where incidents that occur can be documented.
Each support incident will be logged as a job or
ticket within the incident management system.
Used to track incidents with different support reporting requirements.
Who are the 3 main Regulatory and Compliance policy makers?
Sarbanes-Oxley (SOX) = Public company accounting reform and investor protection act of 2002 in Finance
- (HIPAA) Health Insurance Portability and Accountability Act (HIPAA) ◦ healthcare standards for storage, use, and transmission of Healthcare info
- (GLBA) Gramm-Leach-Bliley Act of 1999 (GLBA) = Financial disclosure privacy
What is Acceptable use policy/AUP?
Is a set of rules applied by the owner, creator or administrator of a network, website, or service, that restrict the ways in which the network, website or system may be used and sets guidelines as to how it should be used
What is a Password policy?
Password policy ARE in place to ensure that security is maintained.
Passwords should be complex AND expire.
• Expiration ◦ 30 days ◦ 60 days ◦ 90 days
◦ Critical systems might have passwords changed weekly or every two weeks
What is Inventory management?
- A record of every asset
- Routers, switches, cables, fiber modules, etc.
- Financial records, audits, depreciation
- Make/model, configuration, purchase date, etc.
- Tag the asset • Barcode, RFID, visible tracking number
What are Asset tags used for? On what devices/hardware will you place/see them?
IT uses to track of all of the tangible/touchable/ technical assets in the organization.
There’s usually a tracking system that can track all the switches, the routers, the computers, the monitors, and anything else relating to technology. All IT hw.
What are Barcodes?
A Label Sticker w/ Asset tag # and barcode
The Barcode is scanned, used to track When a device is added to the database,
can track that device - wherever it is.
What is a Compliance policy?
Compliance = Meeting the standards of laws, policies, and regulations
• Catalog of rules
◦ Across many aspects of business and life
◦ Many are industry-specific or situational
• Penalties ◦ Fines ◦ Loss of employment
◦ Possible incarceration • Scope
◦ Domestic and international requirements
IF any change occurs, What Documented business processes include?
you MUST Document business processes IF any change occurs, there should be documentation.
Help Desk documentation may(should) contain references and a ticketing system.
WHAT IS THE Purpose of the change?
The Purpose of the change = WHY THE change is occurring
Scope the change
Scope the change To what degree are the changes being made.
• May be limited to a single server • May be global
Risk analysis
Risk analysis Determine a risk value and how impactful it may be.
Plan for change:
What HAS to happen for the change to be a successful change?
A change plan is an explanation of the proposed changes and the steps needed to achieve them. …
A change plan is developed to implement projects that have been specified for change
- Describe a technical process
- Others can help identify unforeseen risk for a complete picture
- May discuss Scheduling
End-user acceptance
End-user acceptance If the end-user does not know how to or is unwilling to change, then there will be a standstill.
This should be more of a formality.
Change board
Change board: A group, committee that filters what is going to be changed or remain the same and determines an importance or priority.
Approvals
Approvals = Without approvals, the process or project does not continue
What is a Backout plan?
Back out plan: A plan for when the original plan fails or has to rollback.
There should always be a way to revert back to a restore point.
Always have backups and backups for those backups.
Document changes
Document changes See Document Business Processes. Always document everything.
Last step in CompTIA is ALWAYS going to be the same document that changes no matter what takes place.
- Image level backup
Image level backup
- Bare-metal backup using images
- OS Volume snapshots / hypervisor snapshots
- Recover entire system at once • Make an exact copy somewhere else
File level
File level • Copy individual files to a backup
- May not store all system files
- May need to rebuild the OS then perform file restore
Critical applications
Critical applications
• Application (level) software
• App data
- Location of data
- May need all different types of data for a restore
Backup testing
Backup testing • This is done for simulation purposes and enables a leadership confidence in disaster situations
- Confirms the restoration is possible
- Perform audits periodically to ensure capabilities and backups
• UPS
UPS • Uninterruptible Power Supply
◦ Brownouts – low power
◦ Blackouts – no power
◦ Surges – too much power
Surge protector
Surge protector Used to clean the power coming in to prevent blowing out systems.
Surge suppressor • Not all power is “clean”
- Self-inflicted power spikes and noise
- Storms, power grid chan.ges • Spikes are diverted to ground
- Noise filters remove line noise
- Decibel (Db) levels at a specified frequency • Higher Db is better
Cloud storage vs. local storage backups
Cloud storage vs. local storage backups
• Cloud Storage
◦ Data is available anywhere and anytime
◦ If you have a network
• Local Storage ◦ Data is more secure ◦ Need to personally backup ◦ Strong encyption mechanism critical ◦ If you mess up, it’s on you
Account recovery options
Account recovery options= Apps can’t function if they can’t authenticate.
This is a good reason for implementing a centralized administration. If the shit hits the fan, local accounts may not be able to authenticate to your server..
BUT, Cloud may still be available.
Equipment grounding
Inside the pc case it’s power supply is grounded to the motherboard, and everything else. The power supply is also grounded to the case.
We can put our ESD band clipped on the metal part of the case and we’re grounded.
- Also applies to equipment racks • Large ground wire • Don’t remove the ground connection • It’s there to protect you
- Never ever connect yourself to an electrical outlet ground, it won’t prevent ESD
• Proper component handling and storage
Hold by edges, never touch the hw. Use and ESD bag. Ground yourself
- Antistatic bags
Protect all replacement PC hardware from ESD , always use. Wait to open until you are installing it.
- ESD straps
Attach to wrist, and then have a metal squeeze connector to connect to case.
- ESD mats
Stand on- to ground self- while Protect all PC hardware from ESD
- Self-grounding
remove jewelry, and touch case to ground self while installing RAM or replacing hardware/updates.
• Toxic waste handling
Always recycle OR dispose of at a hazardous waste facility
Batteries
- Batteries • and (UPS) Uninterruptible Power Supplies
* Dispose at your local hazardous waste facility
- Toner
Recycle /reuse. Send back/return to manufacturer
- CRT
CRTs • Cathode ray tubes - there’s a few of those left • Glass contains lead • Dispose at your local hazardous waste facility
Cell phones
Mobile device disposal • Wipe your data, if possible • This isn’t always an option
- Manufacturer or phone service provider may have a recycling program or an upgrade program
- Dispose at a local hazardous waste facility • Do not throw in the trash
Tablets
Mobile device disposal • Wipe your data, if possible • This isn’t always an option
• Manufacturer or phone service provider may have a recycling program or an upgrade program • Dispose at a local hazardous waste facility • Do not throw in the trash