Chapter 9 Operational Procedures Flashcards
When a technician is called into a building to service a computer or a network of computers, one of the first tasks is to:
understand how the network is supposed to work
A topology diagram is essentially:
a map of a network that show how equipment is physically arranged in the building and logically connected as a network
A physical topology diagram uses:
representational icons to depict types of equipment such as laptops, PCs, servers, wireless access points, switches and routers
A physical topology diagram may also show:
how computers and printers are arranged and the physical cables that connect them together
A physical topology diagram also maps:
wireless access ports and wiring closets
A technician can use a physical topology diagram to:
find a device she has been called to service
see what other equipment, such as printers, security cameras, and switches, are in use and where to find them
A physical topology diagram may “zoom out” and give:
the general design of a building, including wiring closets on floors and the point-of-presence (PoP) for connectivity to the ISP
A logical topology diagram depicts:
a network’s design, including how computers are grouped together into local area networks (LANs)
A logical topology diagram may include a:
basic map of wiring closets and general areas of the building, but instead of computers, this diagram focuses on network IP addresses
A logical topology diagram is beneficial because:
troubleshooting Internet connectivity is a major part of the IT workday, and knowing which network devices should be on saves time in troubleshooting
A whitepaper focuses on:
a complex technical topic and tries to make it understandable to the average reader.
Companies often publish whitepapers on:
new technologies or products they are presenting to the public in order to influence decision makers
Knowledge bases may also consist of:
links to commonly accessed support forums where fellow IT professionals go to seek and give technical support
Documenting problems, or incidents helps in understanding:
how an incident came about and how a solution was found-as well as who may have had a role in the solution
Incident Documentation will be invaluable to:
technicians the next time an incident occurs
What is a necessary part of legal and safe electronics and technology work?
Compliance with local government regulations
Construction codes for electrical and ventilation design are:
subject to local rules
An acceptable use policy (AUP) is designed to:
keep a network safe from outside intruders
Each organization should define what it considers:
acceptable use of its computing resources within its network
For legal protection of the company, acceptable use rules need to be:
established and agreed to (usually with a signature) by users
Password policy is mostly managed by:
network administrators, who may require complex passwords that need to be changed regularly
It usually falls to the IT department to:
receive and document equipment with durable asset tags
Asset tags are usually:
customized, with each one including the name of the organization along with a barcode and serial number
Most often asset tags are made of:
a metalized polyester that should last as long as the computer asset is expected to be in use
An asset tag allows:
the company to track who is responsible for the equipment and how often it has needed repair
Using a barcode scanner on an asset tag is the most convenient way to:
keep track of the equipment while it is in use in the computer
The IT department is then responsible to:
document the equipment at the end of its usefulness as it goes out of inventory and is sold, donated, or destroyed
Change management is:
the process of preparing for changes in a network, including planning, staffing, organizing, and getting feedback from impacted stakeholders
Knowing how a company performs its many tasks can help create:
a map of how a change should be implemented
Many parts of an organization use the IT infrastructure in different ways, and it is necessary to:
have a document that records how it is used. This means creating a record of who uses the network, what parts they use, and how they impact other users
2 reasons that clarity in the purpose for a successful network change or mitigation is essential are:
knowing the purpose of the project will help limit the score of change and keep it from getting larger than necessary
users will be inconvenienced, so they will need to be brought into the process to identify issues and help make the change successful
Score refers to:
the extent of the impact of a change
Scope must be determined so:
that all users and managers do not suddenly lose the ability to work when a change is implemented
Scoping a change means:
creating a detailed plan itemizing things that will stay the same after the change (things needed to perform core functions), things that will go away (old equipment, outdated applications, and so on), and things that have a mixed outcome (meaning there will be some benefit, like efficiency, but some drawback, like layoffs of loyal employees)
Examples of risks that IT managers plan for when making a change include:
delays
lower-than expected quality
use of of more resources
A change manager may group the several aspects of a change into:
high-, medium-, and low-risk categories and manage the team resources according to the potential impact on the organization
Even small changes to a network need to:
have a well-planned implementation
Change management puts:
planning at the forefront and engages IT people and uses from across the organization
It is important that all users of a network be:
aware of changes that will come and understand, based on detailed analysis, how those changes will impact functions
The end user of the network will be:
the final arbiters of success or failure in the change migration
Managers might need to schedule:
training time, and there may be a learning curve that users will have to accept and endure
The change board is also known as:
a change advisory board (CAB)
The change board is a:
group gathered from areas of the organization that will be impacted by the planned changes
The task of the change board is to:
analyze request for change (RFC) and study the benefits and risks of implementing changes
The change managers works under:
the authority of the change board and gives approval for the work to be done
Members of the change board are usually:
leadership-level employees who understand the impact that requested changes will have on the work in their respective areas
The backout plan is a:
document that lets the change administrators restore the network to the service level that was present before the change
Having a backout plan is important to have if the change plan has unintended consequences because it tells:
all the planned steps and logs the configuration codes necessary to get back to normal
When changes occur, it is important to:
record what was changed and how it was accomplished
There are several ways to back up images, including:
backup to the cloud
using a backup service
creating a network-attached storage (NAS) system for a network
There are three levels of data backup, they are:
System image
File-level back
Critical application backup
Describe system image:
Making a copy of an entire disk, including the Windows image
Describe File-level backup:
Backing up or archiving files such as documents, reports, and pictures
Describe Critical application backup:
Applications needed to restore business after a disaster
A system image backup includes:
everything on the drive-including the OS (which is the system image)
The system image backup can be used to:
restore a failed computer if there is a failure
File-level backups can be:
documents, media files like video or music, or pictures
Critical applications varies depending on the organization, but generally they are:
the first files that will be restored after a disaster to get things running again
Testing backups is important because:
the worst time to find out your scheduled backups were not working properly is when they are needed to recover data.
Testing backups ensures that:
the needed data is available when a backup is necessary, and it allows IT staff to practice restoration so the skill is in place when it is most needed
The main electrical hazards to computers are:
surges
brownouts
blackouts
To combat the main electrical hazards to computers, every:
good wiring closet and server room has a combination of surge suppressors and uninterruptable power supplies (UPS)
An uninterruptable power supply (UPS) keeps:
the power to the units in a server room, wiring closer, or other environment clean and allows for time to run and shut down properly in case of power failure
A true uninterruptable power supply (UPS) is one in which:
connected devices are always powered by the battery, which uses an inverter to continually convert AC power into DC power
A standby power supply (SPS) or line-interactive unit is:
a unit that passes AC power through the unit’s integrated surge suppressor until the AC power fails. At that point, the battery takes over
Surge protectors protect:
devices from extreme changes in power flow
Surge protectors are essentially:
power strips that are plugged into a grounded wall outlet;
Surge protectors are rated in:
joules, which is how the protection level is described. The more joules, the stronger the protection
What devices are normally plugged into Surge protectors?
devices such as PCs or phones
The easiest way to back up data on workstations is to:
use an external drive (hard drive or USB flash drive) with a redundant backup on the cloud
Scheduled backups should be:
run at times when the system is idle, such as overnight and on weekends
On macOS go to System Preferences to enable and configure Time Machine and follow these steps:
- Connect a suitable external disk to a macOS system
- Click Backup Disk
- In the new window that appears, check the Encrypt Backups box to protect the backup
- Enter a password, confirm it, and enter a password hint. Click Encrypt Disk
- Make sure Time Machine is turned on. After the selected disk is encrypted, the backup starts
Linux includes several utilities that can be used for backups. These include:
command line tar and rsync utilities
Backing up files or images to the cloud can be
managed by a cloud backup service that syncs the drives on a schedule you choose.
Common names in the increasingly crowded cloud provider arena are:
Amazon Drive
Dropbox
Google Drive
OneDrive
Describe Cloud; Describe Local Storage; Who has the advantage?
Media
Web; Tape, CD, USB, hard drives; None
Describe Cloud; Describe Local Storage; Who has the advantage?
Cost
As-needed subscription; Hardware, utilities, external location costs, and administrative overhead; Cloud
Describe Cloud; Describe Local Storage; Who has the advantage?
Accessibility
On-demand access to files; Must be physically stored and secured in separate location; Cloud
Describe Cloud; Describe Local Storage; Who has the advantage?
Safety
Secure but requires Web access; Secure when properly handled; None
Describe Cloud; Describe Local Storage; Who has the advantage?
Flexibility
Backup any computer or file, restores files on demand; Can only back up local computers, need physical access to restore files; Cloud
There are three main types of data backup. They are:
Full
Incremental
Differential
Describe Full backup:
A full backup backs up the entire contents of the computer or select drive to another local or network location. This is the longest backup and uses the most storage