Lesson 11: Implementing Operational Procedures Flashcards

1
Q

SOP

A

Standard operating procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A step-by-step list of the actions that must be completed for any given task to comply with policy

A

SOP (standard operating procedure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Database software designed to implement a structured support process by identifying each case with a unique job ticket ID and with descriptive fields to record how the issue was resolved.

manages requests, incidents, and problems

A

ticketing system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the process of involving an expert or senior staff to assist in problem management.

A

Escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An analysis of events that can provide insight into how to improve response and support processes in the future

A

incident report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Practice of assigning an ID to assets to associate them with entries in an inventory database

A

asset tag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RFID

A

radio frequency id

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Documentation showing how network nodes are connected by cabling or how they are logically identified and connected, such as in IP networks

A

Network topology diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

KB

A

Knowledge Base

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Searchable database of product FAQs (Frequently Asked Questions), advice, and known troubleshooting issues.

A

knowledge base (KB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Process for qualifying or quantifying the likelihood and impact of a factor

A

risk analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

UAT

A

user-acceptance testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AUP

A

acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Policy that governs employees’ use of company equipment and Internet services

A

acceptable use policy (AUP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Displaying terms of use or other restrictions before use of a computer or app is allowed

A

splash screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of a KB?

A

A knowledge base (KB) is a reference to assist with installing, configuring, and troubleshooting hardware and software. KBs might be created by vendors to support their products. A company might also create an internal KB, populated with guidelines, procedures, information from service tickets, and answers to frequently asked questions (FAQs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What role do barcodes play in managing inventory?

A

An inventory is a list of assets in database records You must be able to correlate each physical device with an asset record by labeling it. A barcode label is a good way of doing this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You are writing a proposal to improve a company’s current support procedures with a ticketing system. You have identified the following requirements for information that each ticket should capture. Following the CompTIA A+ objectives, what additional field or data point should be captured?

User information
Device information
Problem description/Progress notes/Problem resolution
Categories
Escalation levels

A

Recording the severity of the ticket. This field is important for prioritizing issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the two main types of network topology diagrams? (2)

A
  • The physical topology shows how nodes are connected by cabling.
  • The logical topology shows IP addresses and subnets/VLANs.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The contract ended recently for several workers who were hired for a specific project. The IT department has not yet removed those employees’ login accounts. It appears that one of the accounts has been used to access the network, and a rootkit was installed on a server. You immediately contact the agency the employee was hired through and learn that the employee is out of the country, so it is unlikely that this person caused the problem. What actions do you need to take?

A
  1. You need to create an incident report
  2. remove or disable the login accounts
  3. isolate the infected server; and possibly any user computers that communicate with the server,
  4. remove the rootkit from the server.

In terms of wider security policies, investigate why the temporary accounts were not disabled on completion of the project.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You are trying to troubleshoot a problem over the phone and need to get advice from your manager. How should you handle this with the customer?

A
  • Put them on hold while you speak to someone else
  • Arrange to call back the customer.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When you arrive at a customer location to service a network printer, the user is upset because the printer is not working and therefore he cannot submit his reports on time. How should you approach this user?

A

Demonstrate empathy with the customer’s situation, use active listening skills to show that you understand the importance of the issue, and make the customer confident that you can help. Then use closed-questioning techniques to start to diagnose the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You are working on the training documentation for help-desk agents. What should you include for dealing with difficult situations?

A

Do not argue with customers and/or be defensive. Avoid dismissing customer problems, and do not be judgmental. Try to calm the customer and move the support call toward positive troubleshooting diagnosis and activity, emphasizing a collaborative approach. Do not disclose experiences via social media outlets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

You are troubleshooting a print problem, which turned out to be caused by user error. The user is not confident that the problem is solved and wants more reassurance. You have already explained what the user was doing wrong in some detail. What should you do?

A

Run through the print process step-by-step to show that it works. It is very important to get a customer’s acceptance that a problem is closed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Keeping the workplace free from hazards.

A

Health and safety laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Ensuring that fire prevention and electrical systems are intact and safe

A

Building codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Disposing of waste correctly

A

Environmental regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

OSHA

A

Occupational Safety and Health Administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The amount of charge flowing through a conductor, measured in amps (A or I).

A

Current

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The potential difference between two points (often likened to pressure in a water pipe) measured in volts (V).

A

Voltage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Degree of opposition to the current caused by characteristics of the conductor, measured in ohms (Ω or R)

A

Resistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Circuit breaker designed to protect the device and users of the device from faulty wiring or supply of power (overcurrent protection)

A

fuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Wire that provides a return path for electrical current as a safety feature; if an electrical connection short circuits into the metal chassis, a ground wire ensures that the current flows to ground rather than electrocuting someone handling the faulty device

A

grounded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

ESD

A

Electrostatic discharge

35
Q

Occurs when a path allows electrons to rush from a statically charged body to a component that has no charge. This can occur through touch or even over a small gap if the charge is high enough

A

Electrostatic discharge (ESD

36
Q

A brief increase in voltage

A

Surge

37
Q

When the power that is supplied by the electrical wall socket is insufficient to allow the computer to function correctly

A

Under-voltage event

38
Q

Complete loss of building power

A

Power failure

39
Q

Device that protects electrical devices against the damaging effects of a power surge or spike

A

surge suppressor

40
Q

Defines the level at which the protection circuitry will activate, with lower voltages (400 V or 300 V) offering better protection

A

Clamping voltage

41
Q

The amount of energy the surge protector can absorb, with 600 joules or more offering better protection. Each surge event will degrade the capability of the suppressor

A

Joules rating

42
Q

The maximum current that can be carried or basically the number of devices you can attach. As a rule of thumb, you should only use 80% of the rated capacity.

A

Amperage

43
Q

UPS

A

uninterruptible power supply

44
Q

Battery-powered device that supplies AC power that an electronic device can use in the event of power failure

A

uninterruptible power supply (UPS)

45
Q

VA

A

volt-amperes

46
Q

MSDS

A

material safety data sheet

47
Q

WEEE

A

Waste electrical and electronic equipment

48
Q

Swollen or leaking batteries from laptop computers or within cell phones and tablets must be handled very carefully and stored within appropriate containers. Use gloves and safety goggles to minimize any risk of burns from corrosive material

A

Battery disposal

49
Q

Photocopier and laser-printer toner is an extremely fine powder

A

Toner disposal

50
Q

When might you need to consult SDS documentation?

A

A Safety Data Sheet (SDS), previously known as a Material Safety Data Sheet (MSDS), should be consulted when introducing a new product or substance to the workplace. Subsequently, you should refer to it in case of an accident involving the substance or when you need to dispose of it.

51
Q

In which atmospheric conditions is the risk of ESD highest?

A

During cool, dry conditions when humidity is low. When humidity is high, the static electricity can dissipate through the moisture present in the air.

52
Q

True or False? You should fit an antistatic wrist strap over your clothing as this is most likely to retain a charge.

A

False
The conductive path will occur through your fingers as you touch electronic components. The stud in the wrist strap must make contact with your skin to drain the charge

53
Q

You are updating a deployment checklist for installing new workstation PCs. What are the principal environmental hazards to consider when choosing a location? (4)

A
  • Heat and direct sunlight,
  • Excessive dust and liquids,
  • Very low or high humidity.
  • Tripping hazard
54
Q

What care should you take when lifting a heavy object?

A

The main concern is damaging your back.
Lift slowly and use your legs for power, not your back muscles.

55
Q

What are the principal characteristics of a surge protector?

A

This is a circuit designed to protect connected devices from the effect of sudden increases or spikes in the supply voltage and/or current.

Surge protectors are rated by clamping voltage (low values are better), joules rating (higher values are better), and amperage (the maximum current that can be carried).

56
Q

A server technician has a problem with servers overheating, but the HVAC system appears to run fine. What should the technician utilize?

A.Lifting technique
B.Grounding
C.Compressed air
D.mGRE

A

C. Compressed air

Use a compressed air blaster to dislodge dust from difficult-to-reach areas. Dust is drawn into the computer via ventilation holes. Over time, the dust can form a thick layer over components preventing effective heat dissipation.

When users need to lift or carry items, they need to be aware of the maximum safe lifting weight as well as any restrictions and guidance set out in their job description or site safety handbook.

Electrical equipment must be grounded. If there is a fault that causes metal parts in the equipment to become live, a ground provides a path of least resistance for the electrical current to flow away harmlessly.

Multipoint GRE (mGRE) is a version of the protocol that supports point-to-multipoint links.

57
Q

A helpdesk operator schedules a follow-up call with a user, but the ticket queue gets swamped and they realize they will not be able to make the call on time. What should the operator do?

A.Avoid distractions.
B.Demonstrate respect for the customer’s property.
C.Send a replacement.
D.Communicate with end-user.

A

D. Communicate with the end-user

58
Q

An electrical engineer is setting up a secondary power supply to a data center. They want to ensure that if there is a problem with the electrical supply, power is broken in the circuit. What should the engineer use?

A.API
B.MANO
C.SDN
D.Fuse

A

D. Fuse

A fuse blows if there is a problem with the electrical supply, breaking the circuit to the power source. If the fuse fitted is rated too low, it will blow too easily; if the rating is too high, it may not blow when it should.

Each layer exposes an application programming interface (API) that can be automated by scripts that call functions in the layer above or below.

Management and orchestration (MANO) position virtual network functions (VNFs) within workflows to perform the forwarding and filtering of tasks they are designed for.

The principal innovation of software-defined networking (SDN) is to insert a control layer between the application layer and the infrastructure layer.

59
Q

API

A

application programming interface

60
Q

MANO

A

Management and orchestration

61
Q

VNFs

A

virtual network functions

62
Q

SDN

A

software-defined networking

63
Q

A new helpdesk operator wants to be more efficient. They want to find where other helpdesk operators have already resolved issues. Where should the new operator look?

A.KB
B.API calls
C.VPN
D.Application service

A

A. KB (knowledge base)

64
Q

MSDS

A

Material Safety Data Sheet

65
Q

MPLS

A

Multiprotocol Label Switching

66
Q

RMA

A

return merchandise authorization

67
Q

A data center technician receives the latest shipment, but it includes some hazardous materials. What should the technician check first?

A.MSDS
B.MPLS
C.Lifting technique
D.RMA

A

A. MSDS (Material Safety Data Sheet)

Some hazard information will be provided on labels, but the supplier must also provide more detailed information on an MSDS (Material Safety Data Sheet).

Most WAN providers offer Multiprotocol Label Switching (MPLS) as a means of establishing private links with guaranteed service levels.

When users need to lift or carry items, be aware of the maximum safe lifting weight as well as any restrictions and guidance set out in the job description or site safety handbook.

For repairs, the customer will need clear instructions about how to pack and return the item to a repair center along with a ticket-tracking number and return merchandise authorization (RMA).

68
Q

A phone operator at a helpdesk is working with several frustrated customers and is put in various difficult positions. Which of the following is NOT part of handling difficult situations properly?

A.Post on social media.
B.Have a positive attitude.
C.Stay calm.
D.Actively listen.

A

A. Post in social media

69
Q

An IT professional wants to ensure that they are as professional as possible. Which of the following is NOT a core part of being professional?

A.Attire
B.Language
C.Initiator
D.Cultural sensitivity

A

C. Initiator

The initiator is a client device of the storage area network (SAN), such as a file or database server installed with a fiber channel host bus adapter (HBA).

When an employee visits a customer site, they must represent the professionalism of their company in the way they are dressed and groomed.

When an employee greets someone, they should be conscious of making a good first impression. When they arrive on-site, make eye contact, greet the customer, and introduce themself and their company.

Cultural sensitivity means being aware of customs and habits used by other people. It is easy to associate culture simply with national elements.

70
Q

A newly promoted manager is assessing the team’s work results against regulatory requirements, which has not been conducted in a long time. When reviewing regulatory responsibility, what aspect does NOT typically affect PC maintenance or installation?

A.OSHA
B.HBA
C.Building codes
D.Environmental regulations

A

B. HBA

The host bus adapter for a fibre channel switch enables connectivity and data transfer between devices and is a critical component.

Health and safety laws help to keep the workplace free from hazards. For example, in the United States, the most common safety regulations are those issued by the federal government, such as the Occupational Safety and Health Administration (OSHA)

Building codes ensure that fire prevention and electrical systems are intact and safe. When performing PC maintenance work, make sure to take account of compliance with government regulations.

Environmental regulations help to ensure the disposal of waste is done correctly.

71
Q

A helpdesk manager wants to assign tickets to the relevant support section or technician for reporting and analysis. What should the manager create?

A.SOP
B.Community
C.Policy
D.Categories

A

D. Categories

Categories and subcategories group related tickets together. This is useful for assigning tickets to the relevant support section or technician and for reporting and analysis.

A standard operating procedure (SOP) is a step-by-step list of the actions that must be completed for any given task to comply with policy. Most IT procedures should be governed by SOPs.

Community is where several organizations share the costs of either a hosted private or fully private cloud.

A policy is an overall statement of intent. Employees must understand how to use computers and networked services securely and safely and be aware of their responsibilities.

72
Q

A server administrator identifies a fault that needs to be fixed and wants to take steps towards fixing it. What is the first step the administrator should take?

A.Automation
B.API calls
C.Change request
D.Orchestration

A

** C. Change request**

A change request is generated when a fault needs to be fixed, new business needs or processes are identified, or there is room for improvement in an existing standard operating procedure (SOP) or system.

Automation using scripting means that each configuration or build task is performed by a block of code. While it is technically performing automation, the grouping of automation makes it orchestration.

These steps could be done through API calls, but the task itself is orchestration. The simplest way of interfacing with a cloud service is to use the provider’s website or application programming interface (API) over the internet.

Where automation focuses on making a single, discrete task easily repeatable, orchestration performs a sequence of automated tasks.

73
Q

SOP

A

standard operating procedure

74
Q

A user calls tech support about a hardware malfunction. The tech support representative is not able to resolve the issue. What option does the representative choose next?

A.VNF
B.API calls
C.MANO
D.Replacement

A

D. Replacement

To replace, give the customer clear instructions for how the product will be delivered or how it can be re-ordered, and whether the broken product must be returned.

Virtual Network Function (VNF) specifies and deploys instances of each virtual appliance. VNFs are designed to run as virtual machines (VMs) on standard CPU platforms.

Application programming interfaces (API) are not part of the standard. The simplest way of interfacing with a cloud service is to use the provider’s website or APIs over the internet.

Management and orchestration (MANO) position VNFs within workflows to perform the forwarding and filtering tasks they are designed for.

75
Q

A security manager wants to create a step-by-step list of the completed actions for any given task to comply with policy. What is the manager creating?

A.Scalability
B.SOP
C.Elasticity
D.Confidentiality

A

B. SOP

A standard operating procedure (SOP) is a step-by-step list of the actions that must be completed for any given task to comply with policy. Most IT procedures should be governed by SOPs.

Scalability means that the costs involved in supplying the service to more users are linear. If it costs more than double, the system is less scalable.

Elasticity refers to the system’s ability to handle changes on-demand in real-time. A system with high elasticity will not experience loss of service or performance if demand suddenly doubles (or triples, or quadruples).

Encryption encodes data using a key to give it the property of confidentiality. Confidentiality is not one of the two main principles of backing up.

76
Q

A data center operator receives a new shipment of blade server chassis to process. Which of the following safety concerns should the operator take?

A.Spine and leaf
B.Lifting technique
C.Grounding
D.Zero trust

A

B. Lifting technique

When an operator needs to lift or carry items, they need to be aware of the maximum safe lifting weight as well as any restrictions and guidance set out in their job description or site safety handbook.

The spine and leaf topology provides better support for east-west traffic and the use of software-defined networking (SDN), and overlay networks within data centers.

Electrical equipment must be grounded. If there is a fault that causes metal parts in the equipment to become live, a ground provides a path of least resistance for the electrical current to flow away harmlessly.

Zero trust implies a highly segmented network where each link between two servers must be authenticated and authorized.

77
Q

SDN

A

software-defined networking

78
Q

A highly segmented network where each link between two servers must be authenticated and authorized.

A

Zero trust

79
Q

DaaS

A

Desktop as a Service

80
Q

VDI

A

virtual desktop infrastructure

81
Q

A CIO is trying to get the different directors and managers to conduct a true asset inventory of systems. Which of the following will NOT help in this endeavor?

A.Database systems
B.Tags
C.DaaS
D.Topology diagram

A

C. DaaS

Desktop as a Service (DaaS) is a means of provisioning virtual desktop infrastructure (VDI) as a cloud service.

There are many software solutions available for tracking and managing inventory. An asset-management database system can be configured to store details.

An asset tag can be affixed to a device as a barcode label or radio frequency ID (RFID) sticker.

A network topology diagram shows how assets are linked as nodes. A topology diagram can be used to model physical and logical relationships at different levels of scale and detail.

82
Q

A support technician receives a call from a single user, but the issue happened during a big change. The support team is worried some users might not be calling in, or that the problem may occur again. What should the support team do?

A.Replacement
B.Follow up
C.RMA
D.Change request

A

It might be appropriate to arrange a follow-up call at a later date to verify that the issue has not reoccurred and that the customer is satisfied with the assistance provided.

To replace, give the customer clear instructions for how the product will be delivered or how it can be re-ordered, and whether the broken product must be returned.

For repairs, the customer will need clear instructions about how to pack and return the item to a repair center along with a ticket-tracking number and return merchandise authorization (RMA).

A change request is generated when a fault needs to be fixed, new business needs or processes are identified, or there is room for improvement in an existing standard operating procedure (SOP) or system.

83
Q

Lesson 11 Summary

A

You should be able to implement documentation, change management and professional communication best practices, and use common safety and environmental controls.

Guidelines for Implementing Operational Procedures

Follow these guidelines to implement best practice operational procedures:

Create ticketing and incident-reporting systems to capture user information, device information, description of problems, categories, severity, and escalation levels, and ensure agents use clear, concise written communication to document the problem description, notes, and resolution.
Develop an inventory database to assign asset IDs and manage procurement life cycle, including warranty and licensing and assigned users.
Create SOPs to govern service requests (such as custom installation of software package, new-user setup checklist, and end-user termination checklist) and other best practice documentation (AUPs, network topology diagrams, knowledge bases, and regulatory compliance requirements).
Develop a process and resources to structure change requests/approval (forms describing purpose and scope of the change and risk analysis) and change management (responsible staff member, rollback plan, sandbox testing, end-user acceptance, date and time of the change, and affected systems/impact).
Develop policies and training to ensure professionalism and proper communication by support agents (professional appearance and attire, proper language, positive attitude, active listening, cultural sensitivity, timekeeping, task focus, setting and meeting expectations, respect for confidential/private materials, and ability to deal with difficult situations).
Create best practice SOPs and provision tools to ensure personal safety (equipment grounding, disconnect power before repairing PC, lifting techniques, electrical fire safety, safety goggles, gloves, and air-filtration masks).
Create best practice SOPs and provision environmental controls to ensure device integrity and compliance with regulations (MSDS documentation for handling and disposal of batteries, toner, and electronic waste; temperature, humidity-level awareness, and proper ventilation; dust cleanup with compressed air/vacuums and battery backup/surge suppressors to mitigate power surges, brownouts, and blackouts).