Lesson 20: Implementing Operational Procedures Flashcards

1
Q

You are writing a proposal to improve a company’s current support procedures with a ticketing system. You have identified the following requirements for information that each ticket should capture. Following the CompTIA A+ objectives, what additional field or data point should be captured?
- User information
- Device information
- Problem description/Progress notes/Problem resolution
- Categories
- Escalation levels

A

This list contains no means of recording the severity of the ticket. This field is important for prioritizing issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What role do barcodes play in managing inventory?

A

An inventory is a list of assets stored as database records. You must be able to correlate each physical device with an asset record by labeling it. A barcode label is a good way of doing this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two main types of network topology diagrams?

A

You can create diagrams to show the ‘physical’ topology or the ‘logical’ topology. The ‘physical topology’ shows how nodes are connected by cabling. The ‘logical topology’ shows IP addresses and subnets/VLANs. There are lots of other types of network topology diagrams, of course, but physical and logical are the two basic distinctions you can make. It is best practice not to try to create a diagram that shows both as this is likely to reduce clarity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of a KB?

A

A ‘knowledge base’ (KB) is a reference to assist with installing, configuring, and troubleshooting hardware and software. KBs might be created by vendors to support their products. A company might also create an internal KB, populated with guidelines, procedures, information from service tickets, and answers to frequently asked questions (FAQs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The contract ended recently for several workers who were hired for a specific project. The IT department has not yet removed those employees’ login accounts. It appears that one of the accounts has been used to access the network, and a rootkit was installed on a server. You immediately contact the agency the employee was hired through and learn that the employee is out of the country, so it is unlikely that this person caused the problem. What actions do you need to take?

A

You need to create an incident report, remove or disable the login accounts, isolate the infected server and possibly any user computers that communicate with the server, and remove the rootkit from the server. In terms of wider security policies, investigate why the temporary accounts were not disabled on completion of the project.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When you arrive at a customer location to service a network printer, the user is upset because the printer is not working and therefore he cannot submit his reports on time. How should you approach this user?

A

Demonstrate empathy with the customer’s situation, use active listening skills to show that you understand the importance of the issue, and make the customer confident that you can help. Then use closed questioning techniques to start to diagnose the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are trying to troubleshoot a problem over the phone and need to get advice from your manager. How should you handle this with the customer?

A

Advise the customer that you will put him or her on hold while you speak to someone else, or arrange to call the customer back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are troubleshooting a print problem, which turned out to be caused by user error. The user is not confident that the problem is solved and wants more reassurance. You have already explained what the user was doing wrong in some detail. What should you do?

A

Run through the print process step-by-step to show that it works. It is very important to get a customer’s acceptance that a problem is closed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You are working on the training documentation for help-desk agents. What should you include for dealing with difficult situations?

A

Do not argue with customers and/or be defensive. Avoid dismissing customer problems, and do not be judgmental. Try to calm the customer and move the support call toward positive troubleshooting diagnosis and activity, emphasizing a collaborative approach. Do not disclose experiences via social media outlets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False? You should fit an antistatic wrist strap over your clothing as this is most likely to retain a charge

A

False. The conductive path will occur through your fingers as you touch electronic components. The stud in
the wrist strap must make contact with your skin to drain the charge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In which atmospheric conditions is the risk of ESD highest?

A

During cool, dry conditions when humidity is low. When humidity is high, the static electricity can dissipate through the moisture present in the air.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What care should you take when lifting a heavy object?

A

The main concern is damaging your back. Lift slowly and use your legs for power, not your back muscles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the principal characteristics of a surge protector?

A

This is a circuit designed to protect connected devices from the effect of sudden increases or spikes in the supply voltage and/or current. Surge protectors are rated by clamping voltage (low values are better), joules rating (higher values are better), and amperage (the maximum current that can be carried).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are updating a deployment checklist for installing new workstation PCs. What are the principal environmental hazards to consider when choosing a location?

A

Heat and direct sunlight, excessive dust and liquids, and very low or high humidity. Equipment should also be installed so as not to pose a topple or trip hazard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When might you need to consult MSDS documentation?

A

A ‘material safety data sheet’ (MSDS) should be read when introducing a new product or substance to the workplace. Subsequently, you should consult it if there is an accident involving the substance and when you need to dispose of the substance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An electrical engineer is setting up a secondary power supply to a data center. They want to ensure that if there is a problem with the electrical supply, power is broken in the circuit. What should the engineer use?

A.API
B.MANO
C.SDN
D.Fuse

A

A fuse blows if there is a problem with the electrical supply, breaking the circuit to the power source. If the fuse fitted is rated too low, it will blow too easily; if the rating is too high, it may not blow when it should.

Each layer exposes an application programming interface (API) that can be automated by scripts that call functions in the layer above or below.

Management and orchestration (MANO) position virtual network functions (VNFs) within workflows to perform the forwarding and filtering of tasks they are designed for.

The principal innovation of software-defined networking (SDN) is to insert a control layer between the application layer and the infrastructure layer.

17
Q

A helpdesk manager wants to assign tickets to the relevant support section or technician for reporting and analysis. What should the manager create?

A.SOP
B.Community
C.Policy
D.Categories

A

Categories and subcategories group related tickets together. This is useful for assigning tickets to the relevant support section or technician and for reporting and analysis.

A standard operating procedure (SOP) is a step-by-step list of the actions that must be completed for any given task to comply with policy. Most IT procedures should be governed by SOPs.

Community is where several organizations share the costs of either a hosted private or fully private cloud.

A policy is an overall statement of intent. Employees must understand how to use computers and networked services securely and safely and be aware of their responsibilities.

18
Q

An IT professional wants to ensure that they are as professional as possible. Which of the following is NOT a core part of being professional?

A.Attire
B.Language
C.Initiator
D.Cultural sensitivity

A

The initiator is a client device of the storage area network (SAN), such as a file or database server installed with a fiber channel host bus adapter (HBA).

When an employee visits a customer site, they must represent the professionalism of their company in the way they are dressed and groomed.

When an employee greets someone, they should be conscious of making a good first impression. When they arrive on-site, make eye contact, greet the customer, and introduce themself and their company.

Cultural sensitivity means being aware of customs and habits used by other people. It is easy to associate culture simply with national elements.

19
Q

A server technician has a problem with servers overheating, but the HVAC system appears to run fine. What should the technician utilize?

A.Lifting technique
B.Grounding
C.Compressed air
D.mGRE

A

Use a compressed air blaster to dislodge dust from difficult-to-reach areas. Dust is drawn into the computer via ventilation holes. Over time, the dust can form a thick layer over components preventing effective heat dissipation.

When users need to lift or carry items, they need to be aware of the maximum safe lifting weight as well as any restrictions and guidance set out in their job description or site safety handbook.

Electrical equipment must be grounded. If there is a fault that causes metal parts in the equipment to become live, a ground provides a path of least resistance for the electrical current to flow away harmlessly.

Multipoint GRE (mGRE) is a version of the protocol that supports point-to-multipoint links.

20
Q

A security manager wants to create a step-by-step list of the completed actions for any given task to comply with policy. What is the manager creating?

A.Scalability
B.SOP
C.Elasticity
D.Confidentiality

A

A standard operating procedure (SOP) is a step-by-step list of the actions that must be completed for any given task to comply with policy. Most IT procedures should be governed by SOPs.

Scalability means that the costs involved in supplying the service to more users are linear. If it costs more than double, the system is less scalable.

Elasticity refers to the system’s ability to handle changes on-demand in real-time. A system with high elasticity will not experience loss of service or performance if demand suddenly doubles (or triples, or quadruples).

Encryption encodes data using a key to give it the property of confidentiality. Confidentiality is not one of the two main principles of backing up.

21
Q

A new helpdesk operator wants to be more efficient. They want to find where other helpdesk operators have already resolved issues. Where should the new operator look?

A.KB
B.API calls
C.VPN
D.Application service

A

A knowledge base (KB) is a repository for articles that answer frequently asked questions (FAQs) and document common or significant troubleshooting scenarios and examples.

The simplest way of interfacing with a cloud service is to use the provider’s website or application programming interface (API) over the internet.

While setting up a virtual private network (VPN) is recommended, the actual interfacing will be done through either API calls or the provider’s website.

Administrators should not perform management over the publicly available application service. The management interface should have much tighter security built around it.

22
Q

A CIO is trying to get the different directors and managers to conduct a true asset inventory of systems. Which of the following will NOT help in this endeavor?

A.Database systems
B.Tags
C.DaaS
D.Topology diagram

A

Desktop as a Service (DaaS) is a means of provisioning virtual desktop infrastructure (VDI) as a cloud service.

There are many software solutions available for tracking and managing inventory. An asset-management database system can be configured to store details.

An asset tag can be affixed to a device as a barcode label or radio frequency ID (RFID) sticker.

A network topology diagram shows how assets are linked as nodes. A topology diagram can be used to model physical and logical relationships at different levels of scale and detail.

23
Q

A phone operator at a helpdesk is working with several frustrated customers and is put in various difficult positions. Which of the following is NOT part of handling difficult situations properly?

A.Post on social media.
B.Have a positive attitude.
C.Stay calm.
D.Actively listen.

A

Find a colleague for a private face-to-face chat, but under no circumstances should one ever disclose these types of experiences via social media outlets.

Understand that an angry customer is usually frustrated that things are not working properly or feels let down.

It is never easy to talk to someone who is unreasonable, abusive, or shouting, but it is important to be able to deal with these situations professionally.

Let the customer explain the problem while you actively listen. Draw out the facts, and use them as a positive action plan to drive the support case forward.

24
Q

A helpdesk operator schedules a follow-up call with a user, but the ticket queue gets swamped and they realize they will not be able to make the call on time. What should the operator do?

A.Avoid distractions.
B.Demonstrate respect for the customer’s property.
C.Send a replacement.
D.Communicate with end-user.

A

If it becomes obvious that the technician is not going to be on time, inform the customer as soon as possible. Be honest and direct about delays, but make sure this is done in a positive manner.

Other than a genuinely critical incident taking priority, do not allow interruptions when users are working at a customer’s site.

Operators should demonstrate respect for the customer’s property, although in this scenario the operator is not on-site with the customer.

To replace, give the customer clear instructions for how the product will be delivered or how it can be re-ordered, and whether the broken product must be returned.

25
Q

A data center technician receives the latest shipment, but it includes some hazardous materials. What should the technician check first?

A.SDS
B.MPLS
C.Lifting technique
D.RMA

A

Some hazard information will be provided on labels, but the supplier must also provide more detailed information on an SDS (Safety Data Sheet).

Most WAN providers offer Multiprotocol Label Switching (MPLS) as a means of establishing private links with guaranteed service levels.

When users need to lift or carry items, be aware of the maximum safe lifting weight as well as any restrictions and guidance set out in the job description or site safety handbook.

For repairs, the customer will need clear instructions about how to pack and return the item to a repair center along with a ticket-tracking number and return merchandise authorization (RMA).

26
Q

A support technician receives a call from a single user, but the issue happened during a big change. The support team is worried some users might not be calling in, or that the problem may occur again. What should the support team do?

A.Replacement
B.Follow up
C.RMA
D.Change request

A

It might be appropriate to arrange a follow-up call at a later date to verify that the issue has not reoccurred and that the customer is satisfied with the assistance provided.

To replace, give the customer clear instructions for how the product will be delivered or how it can be re-ordered, and whether the broken product must be returned.

For repairs, the customer will need clear instructions about how to pack and return the item to a repair center along with a ticket-tracking number and return merchandise authorization (RMA).

A change request is generated when a fault needs to be fixed, new business needs or processes are identified, or there is room for improvement in an existing standard operating procedure (SOP) or system.

27
Q

A newly promoted manager is assessing the team’s work results against regulatory requirements, which has not been conducted in a long time. When reviewing regulatory responsibility, what aspect does not typically affect PC maintenance or installation?

A.OSHA
B.HBA
C.Building codes
D.Environmental regulations

A

The host bus adapter for a fibre channel switch enables connectivity and data transfer between devices and is a critical component.

Health and safety laws help to keep the workplace free from hazards. For example, in the United States, the most common safety regulations are those issued by the federal government, such as the Occupational Safety and Health Administration (OSHA)

Building codes ensure that fire prevention and electrical systems are intact and safe. When performing PC maintenance work, make sure to take account of compliance with government regulations.

Environmental regulations help to ensure the disposal of waste is done correctly.

28
Q

A user calls tech support about a hardware malfunction. The tech support representative is not able to resolve the issue. What option does the representative choose next?

A.VNF
B.API calls
C.MANO
D.Replacement

A

To replace, give the customer clear instructions for how the product will be delivered or how it can be re-ordered, and whether the broken product must be returned.

Virtual Network Function (VNF) specifies and deploys instances of each virtual appliance. VNFs are designed to run as virtual machines (VMs) on standard CPU platforms.

Application programming interfaces (API) are not part of the standard. The simplest way of interfacing with a cloud service is to use the provider’s website or APIs over the internet.

Management and orchestration (MANO) position VNFs within workflows to perform the forwarding and filtering tasks they are designed for.

29
Q

A data center operator receives a new shipment of blade server chassis to process. Which of the following safety concerns should the operator take?

A.Spine and leaf
B.Lifting technique
C.Grounding
D.Zero trust

A

When an operator needs to lift or carry items, they need to be aware of the maximum safe lifting weight as well as any restrictions and guidance set out in their job description or site safety handbook.

The spine and leaf topology provides better support for east-west traffic and the use of software-defined networking (SDN), and overlay networks within data centers.

Electrical equipment must be grounded. If there is a fault that causes metal parts in the equipment to become live, a ground provides a path of least resistance for the electrical current to flow away harmlessly.

Zero trust implies a highly segmented network where each link between two servers must be authenticated and authorized.

30
Q

A server administrator identifies a fault that needs to be fixed and wants to take steps towards fixing it. What is the first step the administrator should take?

A.Automation
B.API calls
C.Change request
D.Orchestration

A

A change request is generated when a fault needs to be fixed, new business needs or processes are identified, or there is room for improvement in an existing standard operating procedure (SOP) or system.

Automation using scripting means that each configuration or build task is performed by a block of code. While it is technically performing automation, the grouping of automation makes it orchestration.

These steps could be done through API calls, but the task itself is orchestration. The simplest way of interfacing with a cloud service is to use the provider’s website or application programming interface (API) over the internet.

Where automation focuses on making a single, discrete task easily repeatable, orchestration performs a sequence of automated tasks.