Introductory Flashcards

1
Q

sysadministration:

A

configure servers, monitor networks, provision. Tech generalist. Keep an organization up and running. Diverse set of tech skills.
The field in IT responsible for maintaining reliable computer systems in a multi-user environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

sys admin manages what areas?

A

software, hardware, services necessary for operations. email, file storage. services, servers, software,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

server

A

software or a machine that provides services to other software or machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

forms of server hardware:

A

towers, rack servers, blade servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

file server wants:

A

storage for more files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how to connect to servers remotely:

A

ssh, KVM switch, hub.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

KVM switch

A

Keyboard, mouse, monitor to connect to multiple servers. (Keyboard, video, mouse) to control different computers connected to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

cloud:

A

virtual storage. server storage. networking service with data centers with hundreds of thousands of servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

where is the cloud?

A

datacenters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

drawbacks of using the cloud:

A

costs can add up over time especially for long terms significant storage, you are dependent on the service provider for infrastructure and service availability, susceptible to downtime, security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

who decides which policies to use?

A

sys admin, usually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

should users be allowed to install software?

A

probly not. could get malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how to advise users on complex passwords and their requirements?

A

enforce complex passwords with a mix of symbols, numbers, letters, over 8 char.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

should users be allowed to use personal websites like facebook?

A

personal call. Some companies do hate or like it, depending. I think that there are opportunities to promote the business from social media platforms that we can consider, and that there are times when it is definitely profitable for employees to do that, but when it comes to a reduction in productivity, it can also be necessary to restrict those activities if they are interrupting workflow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

vital to set a device password on company phones. The employees should have the company data on their phones and devices protected, or else bad actors could take advantage of their decisions.

A

password protection against if devices are lost or stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Documentation

A

all established IT policies should be documented and easily accessible to employees, whether on the company intranet, shared drive, other platforms. Promotes understanding and adherence. Wiki, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

services that need managed:

A

file storage, email, provide network access, ensure secure connections, initial setup, updates, security patches, compatibility checks with the computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

managing users and hardware:

A

make and remove users and accounts and machines.
standardized machines.
h

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

hardware lifecycle:

A

when built? how used? what happens to this if someone needs a new one? new or used? who maintained? how many users have used it?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

procurement:

A

where hardware is bought

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

deployment:

A

hardware is set up for employee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

maintenance:

A

software updated and fixed up if issues occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

retirement:

A

hardware is unusable, no longer needed, removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

one way to manage provisioning:

A

stickers, tracking numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what do you do to cut time when deploying?

A

automate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

batch update:

A

update all your servers once a month with all the fixes of that month instead of every time a new update comes out. security and critical at the same time. Make sure the services work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

what can get your company discounts when dealing with procuring equipment?

A

setting up business accounts with dell, hp, etc. Going and just purchasing off Amazon is typically not scalable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what do you probably need to establish a relationship with a vendor?

A

formal approval from upper management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

what are often business that offer specialized services, products, and/or skilled labor to other businesses?

A

service vendors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

why hire me as a full-service vendor?

A

temp contractor: disruptive, lengthy, expensive. Me: simple contract, single contract agreement, I assume responsibility for supplying and managing resources to carry out project.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

vendor life-cycle management:

A

a structured way of finding and working with a website person or other service provider. three stages:

before contract
while contract is active,
after contract is finished

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

vendor: pre-contract:

A

what do you need? find vendors. submit proposals. review proposals. check references. choose best vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

contracted vendor:

A

make sure vendor is doing what supposed to, meeting deadlines, communicate with vendor on issues, watch out for problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

post contract vendor:

A

make sure vendor completed all responsibilities, handle remaining payment, paperwork, keep records of project to refer back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

what are video conferencing machines?

A

idk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

service vendors:

A

businesses offering specialized services, products, skilled labor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

what is an end to end standardization for conducting business partnerships with vendors?

A

vendor life-cycle management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

vendor identification and engagement:

A

identify potential vendors, engage, collect info, inform vendors of service needs, solicit requests for proposals (rfp), invitations to bid (itb). Organization selects and considers a small number of promising proposals. Some organizations use official procurement officers to ensure fair and ethical vendor selections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Vendor qualification and risk mitigation

A

The organization advances the shortlisted proposals to the qualification stage. In this stage, the organization and/or procurement officers request additional information from the vendor to help exclude vendors that might pose a risk to the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Vendor evaluation and selection:

A

The organization and/or procurement officers evaluate the vendor information collected during the qualification phase. The organization’s vendor selection team analyzes the vendor information to determine each vendor’s health and stability as a business, as well as their ability to deliver on the organization’s request. Some of the data points used in this evaluation and selection may include the vendor’s:
History: Does the vendor have a clean business record?

Ratings and quality: What are other customers saying about the vendor online and through services like the Better Business Bureau?

Expertise: Does the vendor have the experience, skills, talent, and/or expertise to deliver on needed services?

Cost: Will the vendor’s proposal fit into the organization’s budget?

Offer compliance: Does the vendor’s proposal fulfill all of the requirements of the organization’s request?

Responsiveness and customer service: How long does it take the vendor to respond to the organization’s requests? What is the vendor’s approach to offering timely customer service?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

endor information management and onboarding:

A

The selected vendor goes through an onboarding process with the organization. Information about the vendor is recorded in the organization’s procurement system and provided to the appropriate stakeholders for the engagement. Information management is important to the vendor life-cycle management and maintaining strategic relationships with vendors. The organization’s IT department may issue IT equipment to the vendor for establishing secure and monitored connections to the organization’s network. The organization might also offer vendors training sessions for the organization’s relevant policies, procedures, expectations, systems, network, tools, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

what does a project manager do?

A

monitor the performance criteria, milestones, due dates, deliverables defined in the SoW and contract.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

risk management:

A

supply chain and product upgrade limitations and other risks. need contingency plans, ensure vendor does not create compliance problems with supply chains as this might impact org reputation. monitor risks to updating, maintaining, upgrading. is the vendor available and capable of upgrading?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

org can support vendor relationships by:

A

develop healthy partnership, ensuring mutual benefit in all parties, develop a communication plan with check-ins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

post contract:

A

warranties, post contract support. procurement officer and project manager are assigned to vendor offboarding. analyse if obligations are met. revisit warranty, obligations. record warranty information. make stakeholders aware of inclusions, exclusions, expiration dates of warranties. keep records of services, tech support, contact. should have defined maintenance plans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

use the org offboarding checklist to complete the post-contract closing.

A

vendor return IT equipment, remove the vendor identity profiles on the organization’s network. ensure intellectual property is stored properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

who plans life cycle schedules for supporting products?

A

commercial vendors of computer operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

what is the EOL?

A

end of life date, when the vendor plans to end all support for the product and it is reclassified as a legacy product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

what should you do before the EOL?

A

update, upgrade, replace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

why should you upgrade?

A

after the EOL, the vendor won’t give support, which can be dangerous for security systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

what must you do if a warranty expires before an EOL date?

A

replace asap. purchase, implement, training.

52
Q

beta testing phase:

A

first introductory phase of product. collect product feedback from early adoption tech users. Used to improve the product before it is available to the general public.

53
Q

product release and primary support phase:

A

beta test ends. vendor has updated and repaired reported defects. product is available, marketed to public. can still have issues, but vendors respond by developing and releasing regular updates and patches. critical to update during this.

54
Q

extended support phase:

A

vendors introduce next gen products. vendor supports the older product, critical patches. product phased out of primary commercial market. resellers may continue to sell it as a used or unused surplus product. buyers should review warranty and support details.

55
Q

EOL:

A

tech support, warranties exp. no more product updates, security patches, drivers, firmware. vulnerable to attacks.

56
Q

how do you track troubleshooting?

A

ticket system and alerts

57
Q

how to recover from data loss

A

make sure your company’s data is backed up somewhere routinely so it can be restored. Ideally, another building.

58
Q

what to consider as an admin? great power, great responsibility.

A

avoid using administrator rights for tasks that don’t require them.

59
Q

respect privacy of others:

A

dont’ use admin rights to access personal data. Don’t look at users’ personal files. Don’t read emails. follow processes and policies to access information.

60
Q

how can you train yourself to think before you type?

A

write out what you plan to do in steps before you act. allows planning ahead and serves as documentation of what you did.

61
Q

how can you protect a system from your mistakes beofre you start?

A

make a copy of the state of things, document steps you need to take to go back. Make a note of what a rollback would look like.

62
Q

rollback

A

reverting to the previous state

63
Q

it change management

A

process for planning, communicating, and implementing technical changes to information systems.

64
Q

change management plans should include:

A

person/team responsible for change
change priority: urgency of change.
change description, planned changes. models, purpose, old versions.
purpose of the change: why? Os, software, drivers, firmware, patches, updates. need.
scope of change: extend. list all IT systems, locations, departments, individuals, vendors, partners, customers, etc affeted. changes to policies, processes, procedures.
date, time, duration of change. rollout. if willl cause outages. inform all staff affected. outsie normal business hourse is best.
change rollback, backout plan in case of failure.
technical evaluation: does it work? record testing on proposed changes. testing sandbox for cloud. metrics for evaluating successful change or not. record results of testing on changes in lab or sandbox.
Affected systems. All IT resources.
anticipated impact of change on systems. new servers, increased load capacity, speed.
resources needed to implement change: hr, budget, time, management oversight, subject matter expert (sme) consult, training, equipment, hardware, software, parts, systems, tools, insurance policies, other
training for impacted users.
risk level for change: how much risk. implement redundant failover system for that critical system before change.
change instructions: detailed steps for the change. instruction manual. no guesswork in changes.

65
Q

change management? why?

A

to make sure that upgrades will be soundly considered.

66
Q

change board approval:

A

cab. oversee all implemented IT changes. official body to approve or deny. may advise on adjustments to plan to meet business goals or comply with regulatory compliance criteria. mitigate risk.

67
Q

user acceptance:

A

best practice for process. beta testing, days of testing, no surprises, test success, user acceptance criteria developed by the change management team. common activities all users should be able to do. Reserve time for fixing issues found by beta testers. when changes are good to go and testing is accepted, change approved, all taken care of, changes should become available to all appropriate end users.

68
Q

common practice to log changes with ticketing systems or bug queus:

A

include commands executed, output obtained. especially if commands are few and straightforward.

69
Q

when to use the script command in troubleshooting and change management:

A

if the commands I need are not yet known because I need to investigate. Start-Transcript for Windows, script linux.

70
Q

in script, how would you put it?

A

script session.log

71
Q

what does script session.log do?

A

writes contents of session to the session.log file. if you want to stop recording, write exit or press Ctrl-D.
file will be in ANSI format, includes screen colors.

72
Q

how to read the session.log files in ansi format?

A

ansi2txt or ansi2html
convert to plain text or html, respectively.

73
Q

Start-Transcript

In the case of Start-Transcript, you can call it like this:

        Start-Transcript -Path C:\Transcript.txt
A

This will write the contents of the session to C:\Transcript.txt. When you want to stop recording you need to call Stop-Transcript. The file created is a plain text file where the commands executed and their outputs are stored.

74
Q

sys admin through gui?

A

not recommended usually. can document what you are doing with obs, vlc, or recordMyDesktop.

75
Q

production

A

the parts of the infrastructure where a certain service is executed and served to its users.

76
Q

test environment

A

a virtual machine running the same configuration as the production environment, but isn’t actually serving any users of the service. you can fix a problem without a user seeing it.

77
Q

secondary or stand-by machine

A

a machine that is exactly the same as a production machine, but won’t receive any traffic from actual users until you enable it to do so.

78
Q

what to do once you tested changes:

A

apply the changes to the secondary machine,
once those are applied, make the stand-by machine the primary machine, and then apply the changes to the other machine.Deply the changes across the fleet after you have verified it works on a smaller subset of machines.

79
Q

What are canaries? good for?

A

. a small group of servers to detect potential issues in the larger changes you want to push out in the system.
bigger services, when you have lots of servers providing the service.

80
Q

always have infrastructure, like canaries.

A

test infrastructure.

81
Q

I should make changes directly in production if it is just a small change

A

false

82
Q

what do we look at to determine the risk?

A

how many users would be impacted if it was down, how important service is to infrastructure.
the more users your service reaches, the more you’ll want to ensure that changes aren’t disruptive.
The more important your service is to your company’s operations, the more you’ll work to keep the service up.

83
Q

what do you do before you start fixing a problem?

A

make sure the error can be recreated.

84
Q

reproduction case

A

creating a roadmap to retrace the steps that led the user to an unexpected outcome

85
Q

three question for reproduction case:

A
  1. what steps did you take to get to this point?
  2. what’s the unexpected result?
  3. what’s the expected result?
86
Q

where to do reproductive case:

A

test instance, never production.

87
Q

what to do after applying fix and documenting?

A

retrace same steps that took you to bad experience. expected experience should now take place.

88
Q

The concept and technological approach of accessing data, using applications, storing files, etc. from anywhere in the world as long as you have an internet connection

A

Cloud computing

89
Q

A facility that stores hundreds, if not thousands of servers

A

Data center:

90
Q

Hardware is set up so that the employee can do their job

A

Deployment

91
Q

The software, the hardware, network, and services required for an organization to operate in an enterprise IT environment

A

IT Infrastructure:

92
Q

Keyboard, video, & mouse switch that looks like a hub that you can connect multiple computers to and control using one keyboard, mouse, and monitor

A

KVM Switch

93
Q

Where software is updated and hardware issues are fixed if, and when, they occur

A

Maintenance:

94
Q

Hardware is purchased or reused for an employee

A

Procurement

95
Q

The parts of the infrastructure where certain services are executed and serve to its users production

A

Production:

96
Q

Recreating an error to test a solution to make sure the problem is gone after a fix has been applied

A

Reproduction case:

97
Q

Hardware becomes unusable or no longer needed, and it needs to be properly removed from the fleet

A

Retirement

98
Q

Reverting to the previous state before you made changes

A

Rollback:

99
Q

A machine that is the same as a production machine, but won’t receive any traffic from actual users until enabled

A

Secondary or stand-by machine:

100
Q

Software or a machine that provides services to other software or machines

A

Server:

101
Q

The field in IT that is responsible for maintaining reliable computer systems, in a Multi-user environment

A

System Administration:

102
Q

A virtual machine running the same configuration as a production environment, but isn’t actually serving any users of the service

A

Test environment

103
Q

whose job to form organizational computer and network policies?

A

sysadmin, chief security officer

104
Q

potential responsibilities of a sysadmin

A

tech support, database admin, network admin

105
Q

device most commonly used to connect to and control multiple computers with keyboard, mouse, monitor (single)

A

kvm switch

106
Q

server types a sysadmin might manage:

A

ssh, email

107
Q

if the cloud storage service a business uses goes down, is the sys admin responsible for the issue?

A

yes

108
Q

tasks a sysadmin needs to keep in mind:

A

routine updates, maintain compatibility, security patches

109
Q

broken computers are in what stage of the hardware lifecycle when eco-recycled.

A

retirement

110
Q

what stage of hardware lifecycle is a machine returned to vendor for recycling?

A

retirement

111
Q

what stage of hardware lifecycle includes setting up a user account and software?

A

deployment

112
Q

what steps should one take when offboarding an employee who is leaving?

A

remove access, wipe machine for future use.

113
Q

what type of server most resembles a desktop computer in appearance?

A

tower.

114
Q

what do you call a machine that uses services provided by a server?

A

client

115
Q

facility that stores hundreds to thousands of servers?

A

data center

116
Q

regular time is set aside to update company servers at once

A

batch update

117
Q

machine having issues, so is repaired. What stage of hardware lifecycle?

A

maintenance

118
Q

what are some it infrastructure services that are essential for keeping a company running?

A

server maintenance, network administration,

119
Q

if you set up a small company, is it different from a big company?

A
120
Q

what are some advantages of using cloud services?

A

you can save money on infrastructure if you need a specific amount of space or services. cost savings, scalability, reduced management overhead.

121
Q

what services are accessed over internet?

A

cloud services

122
Q

what is the most important service to run first?

A

network connection

123
Q

main differences between IaaS, PaaS, SaaS?

A
124
Q

SaaS

A

software as a service. software hosted and managed by a provider, accessible by internet. use, but don’t have to install or manage it.

125
Q

what is IaaS?

A

infrastructure as a service. You rent virtualized computing resources. servers, storage, networks from a cloud provider. foundation.

125
Q

PaaS:

A

platform as a service. platform and tools to develop and deploy applications. don’t have to worry about managing underlying infra

126
Q
A