Operational Procedures Flashcards

1
Q

How do techs help organizations protect organizational assets?

A

Through asset management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are found in every organization and document the asset that the organization has deployed and holds in reserve?

A

inventory lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is used to track things like who has the asset, what type of asset that person has, and where this asset is located (and sometimes why)?

A

Database system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What uses the radio frequency identification (RFID) wireless networking protocol to keep track of inventory?

A

Asset tags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the process involved in buying assets that your project needs?

A

Procurement Life Cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the six steps in the procurement life cycle?

A

1) Identify Needs
2) Evaluate Suppliers
3) Negotiate Terms and Finalize the Purchase Order
4) Receive Invoice and Process Payment
5) Delivery and Audit
6) Maintain Records for Future Audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When suppliers want to know specifically who is using their product, and if this changes they want to know who the replacement is, is known as what?

A

Assigned users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

From a technicians perspective, what do Standard Operating Procedures define?

A

What software can and can’t be installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If SOPs doesn’t list a custom application that needs to be installed, what can a user do?

A

Open a support ticket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two reasons organizations develop SOPs?

A

To enhance the success of the organization and to meet government-related compliance requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What document describes what employees can and cannot do with the organization’s property?

A

Acceptable User Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What provides a road map for current and future techs who need to make changes or repairs to the network over time?

A

Network Topology Diagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do properly run organizations enforce to follow laws and regulations and to maintain a healthy workforce?

A

Regulatory Compliance Requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is used by organizations to ensure there is an understanding and agreement from both parties requiring users to agree to such things as data privacy, terms and conditions, or other compliance measures?

A

splash screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are best practice associated with the documentation and support systems information management that techs use to ensure that a new user is set up with the proper equipment, network credentials, company policies, and so forth?

A

new-user setup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What ensures that departing employees return all equipment issued by the organization, that their network access has been removed, and, where applicable, that knowledge transfer is facilitated?

A

End-User Termination Checklist

17
Q

What do companies use to provide employees with technical support?

A

Ticketing Systems

18
Q

What are a set of documents that tell the tale of equipment used, problems encountered, and solutions to those problems?

A

Knowledge Base

19
Q

What includes a plan to return an infrastructure to its pre-change environment, the steps to create an operational environment for development and/or testing, as well as appointing an individual who is responsible for these types of processes?

A

Documented Business Processes

20
Q

What defines the steps needed to return the infrastructure to its pre-change environment?

A

Rollback Plan

21
Q

Where can you experiment without messing up the primary system?

A

sandbox

22
Q

Who leads rollback plans and sandbox testing?

A

A Responsible Staff Member (RSM)

23
Q

What are the 8 change managment steps

A
  • request form
  • document the purpose of the change
  • determine the scope of the change
  • document the date and time of the change
  • determine impact
  • Analyze the level of risk
  • Change board approval
  • Plan for the change
  • End-User Acceptance
24
Q

What kicks off the change-management process?

A

Request Forms

25
Q

What type of backup is created by merging the previous full backup and all subsequent incremental backups to create a backup that is identical to a new full backup?

A

Synthetic Backup

26
Q

What type of backup backs up to SSDs on four days of the week, a HDD the last day of each week and another HDD the last day of the month

A

grandfather-father-son (GFS) rotation

27
Q

What is the normal temperature and humidity range for computers?

A

About 72 degrees and 30-40 percent humidity

28
Q

What is the most important aspect of equipment placement?

A

That it is in a room with proper ventillation

29
Q

What is a document that details the risks, precautions, and clean-up/disposal procedures for any substance you might work with?

A

Material Safety Data Sheet (MSDS)

30
Q

What regulation deals with PII?

A

General Data Protection Regulation (GDPR)

31
Q

What regulates credit card transactions?

A

Payment Card Industry Data Security Standard (PCI DSS)

32
Q

What are script files that are the shell scripting language for the old-school Command shell on Windows and DOS.

A

Batch File (.bat)

33
Q

What is a powershell script extension?

A

.ps1

34
Q

Which extension is for Visual Basic Scripts?

A

.vbs

35
Q

Which protocol do most remote desktop clients use?

A

Remote Desktop Protocol (RDP) or Virtual Network Computing (VNC)

36
Q

What builds on the capabilities of desktop or endpoint management software by also layering in robust monitoring and management of your network?

A

Remote Monitoring and Management (RMM)

37
Q

Which protocol enables remote monitoring and configuration of just about anything on a network?

A

Simple Network Management Protocol (SNMP)

38
Q

What are the risks of internet based screen sharing or remote desktop services?

A

Anyone who compromises the user’s credentials with the service can access the company network

39
Q

What are the 4 concepts of the 3-2-1 backup strategy?

A
  • Keep at least 1 backup copy offsite
  • Create 1 primary backup file
  • Save backups to 2 different storage media types
  • Create 2 copies of the primary backup file