Chapter 11 - Business Continuity and Computer Support Flashcards

1.6, 6.7

1
Q

CompTIA Troubleshooting Methodology

A
  1. Identify the problem
  2. Research knowledge base/Internet
  3. Establish a theory of probable cause
  4. Test the theory to determine the cause
  5. Establish a plan of action to resolve the problem
  6. Implement the solution or escalate as necessary
  7. Verify full system functionality
  8. Document findings/lessons learned
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identify the Problem

A
  • Gather Information
  • Duplicate the problem, if possible
  • Question users/ Identify symptoms
  • Determine if anything has changed
  • Approach multiple problems individually
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Research Knowledge Base

A
  • Pull from the experience of those who have come before you
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Establish and Test Theories

A
  • Question the obvious
  • Consider multiple approaches
  • Test the theory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Establish a Plan of Action

A
  • Decide if you will repair, replace, or ignore the problem
  • Identify the potential side effects of your plan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Implement The Solution

A
  • want to cause as little disruption to the systems in place and their users as possible
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Verify Full System Functionality

A
  • verify the system as a whole continues to function properly
  • Prevent the recurrence of an issue
  • User education, by changing a process, or by using an alternate software or equipment provider
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Document Findings

A
  • Document the symptoms, your actions, your outcomes, and any lessons learned
  • Knowledge bases evolve and grow over time as issues are experienced
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Business Continuity

A

a proactive approach to ensure that essential business functions persist during and after any unforeseen events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fault Tolerance

A

the ability of a system to continue operation without interruption even when one or more of its components fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Redundancy

A

the duplication of critical components of functions to increase reliability and prevent system failure. It ensures that backup options are available in case of primary component’s malfunction

  • avoiding a single point of failure in a network’s configuration, you are ensuring that a network is redundant
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Failover

A

the automatic process where, in the event of a failure, the system switches to a redundant or standby system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Uninterruptible Power Supply (UPS)

A

a device designed to provide immediate and uninterrupted emergency power to connected equipment when the main power source is lost

  • Seamless Transition
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Generator

A

a device that transforms mechanical energy, often derived from fuel sources like diesel or gas, into electrical energy

  • long-term solution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data Replication

A

the process of copying data from one location to another, ensuring that both locations maintain the same u[-yo-date information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Redundant
Array of Independent Disks (RAID)

A

a technology used to combine multiple hard drives into a single unit to improve data reliability, performance, or bothx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Disaster Recovery

A

is the administrative function of protecting people and resources while restoring a failed network or device as quickly as possible

  1. Data Restoration
  2. Data Prioritization
  3. Restoring Access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data Restoration

A
  • three common methods to storing data
  1. Locally stored data
  2. Network attached storage
  3. Cloud stored data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data Prioritization

A

the idea that an organization’s IT environment creates data through many different channels, thus it is important to create a hierarchy of data to ensure the most valuable data is backed up before all else.

  1. Data center environment (Computer room and server room)
  2. Hardware (networks, servers, desktop, and wireless device)
  3. Software (email, Office Productivity Application)
  4. Data (Clients’ data, Employee Files, Accessibility
20
Q

RAID O (Striping)

A

splits and disperses data across hard drives for improved performance

21
Q

RAID 1 (Mirroring)

A

Duplicates Data across hard drives

  • It uses mirroring to provide some protection and sometimes increases data speed.
22
Q

RAID 5 (Striping with Parity)

A

Splits data across hard drives, while utilizing parity to detect errors and rebuild damaged files

  • It provides
    increased performance and can survive the loss of a member disk.
  • Requires at least three 3 disks (2 for data and 1 for parity).
23
Q

Full Backup

A

creates and stores a copy of all data

24
Q

Daily Backup

A

Only creates a backup of data changed within a 24-hour period.

25
Q

Differential Backup

A

Only creates a backup of data that has changed since the last backupI

26
Q

Incremental Backup

A

Only creates a copy of, and stores what has changed since any type of previous backup.

27
Q

Power surge

A

temporary but gradual sudden increase in of voltage on a power line

28
Q

Power Spike

A

very short pulses of energy on a power line that contain very high voltages

29
Q

Blackout

A

completes loss of power

30
Q

Brownout

A

reduced amount of power

31
Q

Contingency Plan

A

key when implementing business continuity

32
Q

Network Redundancy

A

For a server to work, it must be connected to the other computers on the network. There are two main
ways to provide fault tolerance for a server:

  • Install multiple NICs in the server. If one card fails, the others take over.
  • Allow multiple paths between the server and the computers on the network.
33
Q

Site Redundancy

A

provides a complete duplicate of the computers and data at a location away from the
main computer systems.

  • The main site and the redundant site are connected by high-speed data lines
    that allow the data created at the main site to be duplicated at the remote site in real- or near-real time.
34
Q

Power Redundancy

A

Computers need a constant supply of electricity to work. To protect against data or service loss from
power outages, it’s important to have redundant power.

  • If power is coming in from the wall, the computer uses that
    power. However, if the power from the wall shuts off, the computer immediately switches to battery
    power.
35
Q

Bare Metal Backup

A

backs up the entire computer including
the operating system without requiring software to be reinstalled.

36
Q

Full disk image

A

System backups begin by capturing a full image of a disk at a certain point in
time.

37
Q

Incremental Backups

A

To capture the files that do change, perform incremental backups
that include only files that have been added or modified since the last backup.

38
Q

System restoration

A

If a system fails, users can restore system files by using the last full backup
and then all incremental backups since that point in time.

39
Q

Full backups

A

backup all data at specific points in time.

40
Q

Differential backups

A

include only the data that has changed since the last full backup.

41
Q

Transaction log backups

A

allow administrators to restore a database to a particular moment in
time by rolling back transactions and preserving database integrity.

42
Q

Replication

A

is a mirror copy of the database saved on a separate host.

  • When a transaction is made to the database, it is saved to the master and the replica.
43
Q

Read-only copies

A

a database are made through snapshots.

  • Read-only backups are often used when the data in the database no longer needs to be updated.
  • These can be used to store data
    for historical purposes or to recover from a serious error where other transaction rollbacks have failed.
44
Q

Enterprise Resource Planning (ERP)

A

integrates business operations and manages the flow of data between various departments.

  • It does not focus on mitigating vulnerabilities in systems that support critical workflow and resources.
45
Q

Business Impact Analysis

A

identifies critical business functions that need to be performed during disasters and other times of disrupted operations.

46
Q

Striping

A

is the process of storing consecutive segments of data across different storage devices; it enables better throughput and performance.

47
Q

Parity

A

is a calculated value that’s used to restore data from the other
drives if one of the drives in the set fails.