CompTIA A+ 1201 - 4.0 Operational Procedures Flashcards
Patch Management Lifecycle
Notification
Assessment
Acquisition
Testing
Deployment
Validation
Full Backup
Backs up all of the chosen data regardless of when it was previously backed up.
Higher time and storage requirements, with low recovery complexity due to single job.
Incremental Backup
Backs up the new files and folders that have been modified since the last backup job.
Lower time and storage requirements, with high recovery complexity due to multiple jobs.
Differential Backup
Backs up the new files and folders modified since the last FULL backup.
Moderate time and storage requirements, with moderate complexity due to 2 jobs.
Synthetic Backup
Synthesizes the previous full backup and the incremental backups over a period of time and combines them.
This erases the previous full backup and becomes the full backup.
GFS Backup
Grandfather-father-son media rotation.
A label scheme for monthly, weekly and daily backup jobs.
Most recent data (son) has shortest retention period (one week) up to oldest (grandfather) with a longer retention period (one year)
3-2-1 Backup Rule
3 Copies of your data
Across 2 media types
1 copy held offline and off-site
Power Surge
Abrupt but brief change in the value of voltage
Power Spike
A powerful surge, such as the kind caused by lightining.
Power Sag
Power supply to components briefly dips below required levels
Brownout
Power from the wall socket is insufficient to allow devices to function correctly.
Line Conditioner
A device that adjusts voltages in under-voltage and over-voltage conditions to maintain a 120v output.
Power Distribution Unit (PDU)
A device designed to provide power to other devices that require it.
Mean Time Between Failure (MTBF)
The rating on a device or component that predicts the expected time between failures.
Temperature, Humidity and Ventilation (THV)
Excessive heat effects computer reliability, high humidity causes condensation and low humidity can result in Electro-static discharge (ESD)
A decent HVAC system can prevent this.
Voltage Clamp
Feature of a Surge Protector that cuts off the power flow after a certain voltage is exceeded.
Change Management Process
RIAIR
1) Request for Change
2) Impact Analysis
3) Approval / Denial
4) Implement Change
5) Review / Reporting
Request for Changes (RFC’s)
Requests that are made by management staff to implement new features into the IT infrastructure, to be approved by senior management.
Standard Operating Procedures (SOP’s)
Documented standards for work.
Process for Instituting Change to Operational Policies and Procedures
1) Implementation of changes should be carefully planned.
2) Organizations should attempt a trial implementation for major changes.
3) Create a rollback or remediation plan (IMPORTANT)
4) Schedule changes to have minimal impact on workflow. Eg; Weekends.
5) After the change is implemented, assess its impact.
6) Review the process and document outcomes.
Disaster Recovery Plan (DRP)
A documented and resourced plan showing actions and responsibilities to be used in response to critical incidents.
1) Identify scenarios for natural and man-made disasters and options for protecting systems.
2) Identify tasks, resources and responsibilities for responding to a disaster.
3) Train staff in the disaster planning procedures and how to react well to change.
Recovery Images Guidelines
1) Windows computers come with a recovery image, but the image does not get updated unless you do it manually.
2) Custom recovery images should contain current OS state, plus all desktop apps installed at the boot partition.
3) Any changes to apps or configuration requires a new recovery image to be created.
4) Use recovery images to restore a PC’s or VM’s functionality (OS and Apps)
5) Use file-level backups to restore user profile information and data.
Backups Guidelines (RTDD)
1) Remember, restoring data from backup provides data that is only as current as the last backup.
2) Test backups after they are created.
3) Determine where backups will be stored, both locally and offsite.
4) Document the account recovery methods that will be needed for any systems, applications or websites used by the organization.
Backup Levels (Low to high importance)
File -> Image -> Critical Applications
.bat
Windows Batch File
.ps1
PowerShell Script
.sh
Linux Shell Script
.vbs
VBScript File
.js
JavaScript file
.py
Python Script
Variables (Scripting)
Contains values that can change during program execution.
Constants (Scripting)
Contains values that do not change during program execution.
Identifiers (Scripting)
A computer programming component used to access program elements such as a stored value (constant, variable, etc…)
Environment Variables (Scripting)
A storage location in the OS command Shell.
In a script, the Shell will recognize some variables and replace them with the correct path.
Eg; %SystemDrive% = “$:" %SystemRoot% = $:\Windows
Will always refer to the root drive, regardless of letter assigned.
Branch (Scripting)
A programming technique used to control flow based on a logical condition and implemented with “if” or “goto” statements.
if [[ some condition ]]; then
do_something
finish
Loop (Scripting)
A programming technique used to repeat a task until a logical condition is met and implemented with “for” or “while” statements.
Integers (Scripting)
Whole Numbers
Floating Point Numbers (Scripting)
Whole numbers that support decimal fractions.
Can also store whole numbers in decimal form -> 4.0
Eg; 4.1, 26.4
Boolean Values (Scripting)
Indicates that something is either TRUE or FALSE ( 1 or 0 )
Characters (Scripting)
A single, textual character.
Eg; D, a, 7, $, @ , #
Strings (Scripting)
A string of text characters.
Eg; “Hello World”, “XYZ”