Operational Procedures Flashcards

1
Q

What is ESD?

A

electrostatic discharge

Explanation:
This is the discharge of static electricity caused by two electrically charged objects making contact with each other. It takes less than 100 volts (V) of this type of discharge to damage a computer. This is a very small amount.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What types of codes or regulations are required to be met to remain in compliance with the local government?

A

electrical codes, fire prevention codes, building codes, and environmental codes

Explanation:
All these codes outline how computing systems or cabling can be set up in commercial or industrial areas. They are often put in place to ensure safety.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is automation?

A

a script designed to perform a task that remains constant

Explanation:
Automation is useful in performing basic tasks that need to remain the same each time a script is run. Basic automation scripts can be written to perform tasks such as adding new users to a group in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is SDS?

A

safety data sheet

Explanation:
These sheets outline how you should properly handle and dispose of certain hazardous materials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is OSHA?

A

Occupational Safety and Health Administration

Explanation:
This is the federal organization that oversees the SDS program (formerly MSDS program), along with numerous other safety programs and initiatives in the United States.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the EPA?

A

Environmental Protection Agency

Explanation:
This is the federal program tasked with overall protection of the environment and atmosphere. They are concerned with ensuring that toxic or hazardous materials do not endanger the environment and are handled according to federal regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is DRM?

A

digital rights management

Explanation:
DRM controls what can be done with software and enforces certain security measures. This is common in audio and video electronics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a EULA?

A

end user license agreement

Explanation:
This agreement specifies what users can do with a piece of software when they are given access to it. It may include language like “Do Not Reproduce” and other constraints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is PII?

A

personally identifiable information

Explanation:
This is detailed information about someone that can be used as a means to identify them or link them with a certain role. Examples include a person’s first and last name, address, date of birth, and social security number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an enterprise license?

A

a license granting businesses the authority to use software for commercial purposes

Explanation:
This type of license is usually given to larger companies and is usually sold by the number of users or number of seats using the software on a subscription basis. A popular one is Microsoft Volume Licensing, which grants a license key for a certain number of users to download and authenticate their Office programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is chain of custody?

A

a set of measures that proves evidence has maintained integrity during an incident response

Explanation:
Chain of custody provides a means to ensure that no part of evidence has changed while it is being handled. It provides the names of evidence handlers, a record of what was done with the evidence and when it was done, as well as other pertinent information. It ensures nothing has been tampered with to influence the outcome of an investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an acceptable use policy?

A

company policy outlining how the information systems may be used

Explanation:
This is a policy that organizations require employees to sign before beginning work. It clearly outlines what can be done on the systems that are the property of the company and what can be done on the company network with any device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is open-source software?

A

software whose code is freely available for anyone to use or modify as they wish

Explanation:
Open-source software, sometimes known as Free and Open Source Software (FOSS), refers to any software whose code is freely available to anyone for use and modifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is used to prepare for power surges and blackouts?

A

surge suppressors and battery backups

Explanation:
Surge suppressors help reroute or suppress voltage spikes that come into the line, so that they don’t do damage to production systems. Battery backups ensure that critical systems will remain online in the event of a power loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a personal license?

A

a single user license granted for noncommercial purposes

Explanation:
A personal license is a genuine copy of a piece of software, which is intended only for individual use. This is sometimes granted to students enabling access to popular software while they attend school.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is VNC?

A

virtual network computing

Explanation:
Virtual network computing (VNC) is an open-source protocol run on a client-server model that provides a method for remotely sharing desktops.

17
Q

What protocol runs on port 3389?

A

RDP

Explanation:
Remote desktop protocol (RDP) is a Microsoft proprietary protocol that allows for remote access to Windows computers via port 3389.

18
Q

What is mapping?

A

mounting a remote file system to a drive letter

Explanation:
Sometimes a file system will need to have its drive letter changed. Creating a script can be useful in creating a reproducible result each time a file system is remapped.

19
Q

What is an antistatic bag?

A

a bag designed to protect an electronic device from static charges

Explanation:
An antistatic bag, typically pink or silver in color, is a bag that collects electrical charges, such as static charges on its exterior, effectively protecting the enclosed component from damage.

20
Q

Where should backups be kept according to the 3-2-1 backup rule?

A

onsite and offsite

Explanation:
The 3-2-1 backup rule states that three backups should be taken with two remaining onsite and one stored offsite for the most comprehensive protection against data destruction or failure. This ensures that a working backup is available in case of a minor or major catastrophe.