Operational Procedures Flashcards

1
Q

Includes the name, contact info, department, and role of the person submitting the ticket—helps identify the impact and priority level.

A

User Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Details about the affected system: device type, hostname, asset ID, OS version—helps technicians troubleshoot efficiently.

A

Device Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A clear explanation of the issue the user is experiencing, including error messages, symptoms, or when the issue began.

A

Description of Problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Used to sort and organize issues based on type, such as hardware, software, network, or user account.

A

Categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Indicates how critical the issue is—used to prioritize responses. Often ranked as low, medium, high, or critical.

A

Severity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Defines when and how to pass the ticket to someone with more expertise or authority based on complexity or urgency.

A

Escalation Levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Clearly stated overview of the issue from the user’s perspective—essential for understanding and documenting the problem.

A

Problem Description (Communication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ongoing documentation of steps taken, observations made, or changes implemented while troubleshooting the issue.

A

Progress Notes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Detailed explanation of how the issue was resolved, including steps taken, fixes applied, and any user education.

A

Problem Resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A centralized collection of known issues, troubleshooting steps, and solutions that technicians can reference to resolve problems faster and more consistently.

A

Knowledge Base

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The process of tracking, organizing, and managing IT resources (hardware, software, and related info) throughout their lifecycle—from procurement to disposal. Ensures accountability, security, and cost-efficiency.

A

Asset Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A regularly updated record of hardware, software, and other company-owned technology resources.

A

Inventory Lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A structured system used to store, track, and manage IT assets, including fields for location, status, user, and warranty.

A

Database System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Physical labels or digital IDs attached to assets to help track and manage devices throughout their lifecycle.

A

Asset Tags and IDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The full lifecycle of acquiring, deploying, maintaining, and retiring hardware/software assets.

A

Procurement Life Cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tracking of support coverage and software licensing to ensure compliance and reduce cost of ownership.

A

Warranty and Licensing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Documentation showing which employees are assigned which devices, aiding accountability and inventory tracking.

A

Assigned Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A policy outlining how employees may (and may not) use company-owned devices, internet, and services.

A

Acceptable Use Policy (AUP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A visual representation of network layout, including devices, segments, and connections—used for planning and troubleshooting.

A

Network Topology Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Documents or notices that ensure systems and procedures meet legal or industry-specific regulations (e.g., HIPAA, GDPR).

A

Regulatory Compliance Requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A brief warning or agreement screen shown on login that may serve legal or security purposes.

A

Splash Screens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Detailed logs of security breaches, accidents, or unexpected events to support analysis and remediation.

A

Incident Reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Step-by-step written instructions that standardize how IT tasks and processes should be carried out.

A

Standard Operating Procedures (SOPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A documented procedure for configuring and deploying specific software packages per company standards.

A

Procedures for Custom Installation of Software Package

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A checklist of IT-related tasks to complete when onboarding a new employee, such as account creation and hardware assignment.

A

New-User Setup Checklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A checklist for properly offboarding an employee, including account deactivation, asset collection, and data protection.

A

End-User Termination Checklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The formal process of planning, approving, and documenting changes to IT systems and services in order to reduce risk and maintain stability.

A

Change Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Step-by-step procedures used to guide the change process and ensure consistency and repeatability across IT operations.

A

Documented Business Processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A tested plan to revert a system to its previous state if the change causes unexpected problems or failures.

A

Rollback Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Testing changes in a safe, isolated environment before applying them to live production systems.

A

Sandbox Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The individual who is accountable for implementing the change and monitoring its outcome.

A

Responsible Staff Member

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A standardized document used to propose a change and include necessary details for approval.

A

Change Request Form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A brief description that explains why the change is needed and what it aims to improve or fix.

A

Purpose of the Change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Outlines how large or complex the change is, including the number of systems, users, or departments involved.

A

Scope of the Change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The scheduled moment when the change will be made—should minimize user disruption and align with low-usage periods.

A

Date and Time of the Change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Lists which systems, users, or services will be directly or indirectly affected by the change.

A

Affected Systems / Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

The process of evaluating the likelihood and severity of problems that could result from the change.

A

Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A classification based on how serious the potential risks are (e.g., low, medium, high) to help prioritize change approval.

A

Risk Level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Approval by a formal committee that evaluates proposed changes for risk, impact, and timing before implementation.

A

Change Board Approval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Identify a need or issue that justifies a change—could be a problem, upgrade, or efficiency improvement.

A

Step 1: Identify the Need for Change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Submit a formal request that documents what the change is, why it’s needed, scope, risk, impact, and timeline.

A

Step 2: Submit a Change Request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Assess the change’s risk level, possible impact on systems/users, and determine any needed approvals or escalations.

A

Step 3: Risk and Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Review the proposed change for approval, often involving a change advisory board (CAB) or management.

A

Step 4: Review and Approval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Create a step-by-step plan to implement the change, including who is responsible, timing, and a rollback plan.

A

Step 5: Change Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Test the change in a controlled or sandbox environment to verify it works without affecting live systems.

A

Step 6: Testing the Change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Apply the change according to the plan during the scheduled time—often during low-impact hours.

A

Step 7: Implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

If something goes wrong, execute a predefined process to revert to the previous stable state.

A

Step 8: Rollback (if needed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Monitor system performance and confirm that the change achieved its intended goal without causing new issues.

A

Step 9: Validation and Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Document the change, outcomes, lessons learned, and update configuration management databases if needed.

A

Step 10: Documentation and Closure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A backup type that copies all data every time it runs, regardless of changes. It’s the most comprehensive and simplest to restore.

A

Full Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A backup that only saves data changed since the last full backup—efficient for daily backups, but restores can be slower.

A

Incremental Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A backup that saves all data changed since the last full backup, regardless of any other backups in between—restores faster than incremental.

A

Differential Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A backup type created by combining the full backup with all subsequent incrementals into one synthetic full backup—reduces backup load.

A

Synthetic Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

The process of restoring backed-up data to verify that the backups work and can be reliably restored in a real scenario.

A

Backup Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

How often backups and tests should be performed—depends on how frequently data changes and how critical it is.

A

Backup Frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Refers to whether backups are stored at the primary location or at a secondary physical or cloud location for disaster recovery.

A

On-Site vs. Off-Site Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

A traditional backup rotation strategy involving daily (son), weekly (father), and monthly (grandfather) backup cycles.

A

Grandfather-Father-Son (GFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Backup strategy that states you should keep 3 copies of your data, on 2 different media types, with 1 stored off-site.

A

3-2-1 Backup Rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Provides safety information for hazardous substances like toner or batteries; explains storage, handling, and disposal procedures.

A

Material Safety Data Sheet (MSDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Batteries, especially lithium-ion, should be recycled through proper channels to avoid fire and environmental harm. Never throw them in regular trash.

A

Proper Battery Disposal

61
Q

Toner cartridges should be returned to the manufacturer or taken to a recycling facility—never incinerated or landfilled.

A

Proper Toner Disposal

62
Q

Electronics contain hazardous materials and should be disposed of through certified e-waste or recycling programs.

A

Proper Disposal of Other Devices and Assets

63
Q

Monitoring these factors ensures IT hardware remains cool and dry—avoiding overheating, corrosion, or condensation damage.

A

Temperature, Humidity-Level Awareness, and Proper Ventilation

64
Q

IT equipment should be placed away from direct heat, windows, or vents to prevent environmental wear or malfunction.

A

Location / Equipment Placement

65
Q

Dust buildup can block airflow and cause overheating—should be removed regularly as part of hardware maintenance.

A

Dust Cleanup

66
Q

Safe ways to remove dust and debris without damaging internal components or spreading harmful particles.

A

Compressed Air / Vacuums

67
Q

Unexpected spikes in power can damage sensitive electronics—this device diverts excess voltage away from connected equipment.

A

Surge Suppressor

68
Q

Provides emergency power to computers and networking equipment during outages—prevents data loss and hardware damage.

A

Battery Backup (UPS)

69
Q

The structured approach to handling and documenting security incidents, including containment, investigation, and recovery.

A

Incident Response

70
Q

A documented timeline that accounts for every person who accessed or handled evidence, used to maintain credibility in investigations.

A

Chain of Custody

71
Q

When appropriate, higher-level personnel and/or authorities must be alerted to ensure proper handling and legal compliance.

A

Inform Management / Law Enforcement as Necessary

72
Q

A full bit-for-bit image of a storage device to preserve digital evidence for analysis without altering the original.

A

Copy of Drive (Data Integrity and Preservation)

73
Q

Accurate, time-stamped records of the incident, including what occurred, who was involved, and how it was handled.

A

Documentation of Incident

74
Q

Proof that software has been lawfully purchased and used within the terms set by the software vendor.

A

Valid Licenses

75
Q

Software licenses must still be active or within their time limits to remain compliant and functional.

A

Non-Expired Licenses

76
Q

Licenses that restrict usage to an individual versus those that allow enterprise-wide or multi-user deployment.

A

Personal Use License vs. Corporate Use License

77
Q

A license that allows users to modify and redistribute software under specified terms (e.g., GNU GPL, MIT License).

A

Open-Source License

78
Q

Financial transactions involving credit card information must be secured per PCI-DSS standards to prevent fraud.

A

Credit Card Transactions

79
Q

Government-issued data like Social Security numbers or driver’s license info that requires protection under various laws.

A

Personal Government-Issued Information

80
Q

Data that can identify a specific individual, such as name, email, or biometric identifiers—must be protected by law.

A

PII (Personally Identifiable Information)

81
Q

Medical data regulated under laws such as HIPAA; includes diagnoses, treatments, and patient histories.

A

Healthcare Data

82
Q

Legal or organizational rules that specify how long data must be stored before being deleted or archived.

A

Data Retention Requirements

83
Q

Wear clothing that fits the environment—whether formal, business casual, or field-appropriate—to build trust and show professionalism.

A

Professional Appearance and Attire

84
Q

In formal settings, wear a suit or similarly appropriate outfit that reflects high-level professionalism.

A

Formal Attire

85
Q

Dress neatly but less formally, typically a collared shirt or blouse and slacks; often expected in office environments.

A

Business Casual Attire

86
Q

Use respectful and professional language, avoiding acronyms, tech jargon, or slang unless the customer clearly understands them.

A

Use Proper Language (Avoid Jargon, Acronyms, and Slang)

87
Q

Stay upbeat and assured to reassure customers and create a more productive support experience.

A

Maintain a Positive Attitude / Project Confidence

88
Q

Focus fully on the customer, take notes if needed, and wait until they finish speaking before responding.

A

Actively Listen, Take Notes, Avoid Interrupting

89
Q

Respect cultural differences and use formal titles when appropriate to show respect across diverse environments.

A

Be Culturally Sensitive / Use Professional Titles

90
Q

Show up on time for appointments or support calls. If you’re delayed, contact the customer as soon as possible.

A

Be on Time / Contact if Late

91
Q

Refrain from personal calls, texts, or browsing social media during work to maintain focus and professionalism.

A

Avoid Distractions (Calls, Texting, Social Media)

92
Q

Remain calm and respectful even if the customer becomes upset or confrontational.

A

Do Not Argue or Be Defensive

93
Q

Take all concerns seriously; never brush off or belittle the customer’s problems.

A

Avoid Dismissing Customer Problems

94
Q

Stay neutral and helpful—don’t make assumptions or personal judgments about the customer’s situation.

A

Avoid Being Judgmental

95
Q

Ask open-ended questions, restate what the customer said, and confirm your understanding of the issue.

A

Clarify Statements / Ask Questions / Verify Understanding

96
Q

Keep your experiences and customer interactions private—never post about them on social media.

A

Do Not Disclose Customer Info on Social Media

97
Q

Let the customer know what to expect, offer solutions when appropriate, and check back to confirm satisfaction.

A

Set & Meet Expectations / Communicate Status / Follow-Up

98
Q

Offer choices when applicable and help the customer decide whether repair or replacement is the better option.

A

Offer Repair/Replacement Options

99
Q

Give a detailed summary of what was done, including time, services, or parts used.

A

Provide Proper Documentation

100
Q

Be respectful and cautious with sensitive materials you might come across—such as documents, photos, or files.

A

Handle Confidential / Private Customer Materials Appropriately

101
Q

You arrive at a client’s office where everyone is wearing business casual attire. You’re wearing a hoodie and jeans. What should you have done differently?

A) Worn a branded company t-shirt
B) Matched your attire to the environment
C) Worn whatever is most comfortable
D) Avoided the visit and offered remote help

A

Answer: B – Matched your attire to the environment
Professional appearance means dressing appropriately for the client’s setting. Business casual would have been more suitable.

102
Q

While explaining a fix to a non-technical customer, you say: “The NIC was failing to negotiate at 1 Gbps, likely due to a bad SFP.” The customer looks confused. What’s the best response?

A) Keep explaining using the same terms
B) Avoid further explanation to save time
C) Ask if they’d like a simpler explanation
D) Tell them to Google it

A

Answer: C – Ask if they’d like a simpler explanation
Always avoid jargon when speaking with non-technical users. Offering clarity shows professionalism and customer care.

103
Q

A customer begins raising their voice and accusing you of making their problem worse. What should you do?

A) Match their tone to take control
B) Defend yourself and point out they’re wrong
C) Calmly listen and avoid interrupting
D) Leave and report them to management

A

Answer: C – Calmly listen and avoid interrupting
In tense situations, remain calm, listen actively, and don’t escalate. Professionalism includes managing difficult conversations gracefully.

104
Q

You’re working on a client’s PC and find personal financial documents open on the desktop. What’s the correct action?

A) Skim through them to assess risk
B) Close them and continue working
C) Screenshot them to document a potential issue
D) Open them later to verify contents

A

Answer: B – Close them and continue working
Respect customer privacy. Never open or review confidential material unless requested to do so.

105
Q

A customer reports a printer issue. You’re unsure of the cause. What’s the most professional next step?

A) Tell them you don’t know and leave
B) Blame the printer model
C) Ask questions to narrow the scope of the problem
D) Guess and apply the first fix that comes to mind

A

Answer: C – Ask questions to narrow the scope of the problem
Use open-ended questions to clarify issues and avoid assumptions. It shows problem-solving and communication skill.

106
Q

You’re 15 minutes late to an appointment due to traffic. What should you have done?

A) Texted the customer while driving
B) Waited until you arrived to apologize
C) Called ahead to inform them you’d be late
D) Canceled the appointment without explanation

A

Answer: C – Called ahead to inform them you’d be late
Timeliness is key to professionalism. If a delay is unavoidable, notify the customer as soon as possible.

107
Q

During a repair, your phone rings. It’s a personal call. What’s the best action?

A) Take the call quickly—it’s fine
B) Step outside and finish the call
C) Ignore it and focus on the repair
D) Ask the customer for a break

A

Answer: C – Ignore it and focus on the repair
Personal distractions should be avoided during customer interactions. Focus entirely on the job.

108
Q

A customer asks if they should repair or replace a failing laptop. What’s the best way to handle this?

A) Say, “It’s your call.”
B) Offer pros and cons of both options
C) Tell them to always replace
D) Refer them to the internet

A

Answer: B – Offer pros and cons of both options
Professionalism includes helping the customer make informed decisions by explaining repair/replacement options.

109
Q

A batch script file used primarily in Windows to run a sequence of commands in Command Prompt (CMD).

110
Q

A PowerShell script used in Windows environments for task automation and configuration management.

111
Q

A Visual Basic Script file used to automate tasks in Windows; often embedded in Office macros or logon scripts.

112
Q

A shell script file used in Linux/macOS to execute command-line tasks and automate system operations.

113
Q

A JavaScript file, typically used in web development to control dynamic content and interactivity on websites.

114
Q

A Python script used for a wide variety of automation, data processing, and development tasks.

115
Q

Scripts can be used to perform repetitive tasks automatically, reducing manual effort and error.

A

Basic automation

116
Q

Scripts can be used to schedule or trigger computer restarts across multiple systems.

A

Restarting machines

117
Q

A script can automatically assign or reconnect mapped drives for users at login or on-demand.

A

Remapping network drives

118
Q

Scripts can streamline the deployment of software across multiple systems simultaneously.

A

Installation of applications

119
Q

Scripts can be scheduled to back up files or directories at regular intervals without user intervention.

A

Automated backups

120
Q

Used to collect system logs, hardware specs, or usage statistics from local or remote machines.

A

Gathering of information/data

121
Q

Scripts can trigger or schedule operating system or software updates on local or networked systems.

A

Initiating updates

122
Q

Unintentionally introducing malware

A

Can allow harmful software to run if not properly checked

123
Q

Inadvertently changing system settings

A

May change important settings unintentionally

124
Q

Browser or system crashes due to mishandling of resources

A

May consume too much memory or CPU and cause crashes

125
Q

Microsoft protocol allowing full graphical remote control of a Windows computer over a network connection.

A

RDP (Remote Desktop Protocol)

126
Q

Creates a secure, encrypted tunnel for private access to a remote network as if the user were local.

A

VPN (Virtual Private Network)

127
Q

Cross-platform tool that allows remote desktop access by sending screen updates and mouse/keyboard inputs over the network.

A

VNC (Virtual Network Computing)

128
Q

Secure, command-line-based remote access used primarily in Linux/UNIX environments; supports file transfers and tunneling.

A

SSH (Secure Shell)

129
Q

IT management software used by MSPs to monitor, manage, and update remote systems proactively.

A

RMM (Remote Monitoring and Management)

130
Q

Allows a trusted person to view or control a Windows user’s desktop for troubleshooting with the user’s permission.

A

Microsoft Remote Assistance (MSRA)

131
Q

Enables others to view or control your screen in real time (e.g., Zoom share, TeamViewer, Chrome Remote Desktop).

A

Screen-sharing software

132
Q

Provides audio/video communication and sometimes includes remote desktop or screen-sharing features (e.g., Zoom, Teams).

A

Video-conferencing software

133
Q

Allows secure or direct transfer of files between local and remote systems (e.g., SFTP, FileZilla, WeTransfer).

A

File transfer software

134
Q

Centralized tools for IT admins to install updates, manage software, and enforce policies remotely (e.g., Intune, JAMF).

A

Desktop management software

135
Q

Vulnerable to brute-force and man-in-the-middle attacks if not secured with VPN, strong passwords, or network restrictions.

A

RDP Security Concern

136
Q

If compromised, attackers could gain full access to the internal network; requires strong authentication and monitoring.

A

VPN Security Concern

137
Q

Often lacks encryption by default; should be tunneled through SSH or VPN and protected with strong passwords.

A

VNC Security Concern

138
Q

Secure if properly configured, but susceptible to brute-force attacks if using weak credentials or default ports.

A

SSH Security Concern

139
Q

Can be a high-value target for attackers—requires hardened access, 2FA, and close monitoring.

A

RMM Security Concern

140
Q

Only works with user permission, but could be exploited if social engineering tricks users into accepting remote control.

A

Remote Assistance Security Concern

141
Q

What is the proper way to dispose of a lithium battery? (Set 125)

A) Trash can
B) Recycle facility
C) Shredder
D) Burn it

A

Answer: B) Recycle facility

142
Q

Why is documentation important when making changes to systems? (Set 790)

A) For legal reasons
B) To confuse users
C) To keep printers busy
D) To entertain staff

A

Answer: A) For legal reasons

143
Q

What is the proper way to dispose of a lithium battery? (Set 546)

A) Trash can
B) Recycle facility
C) Shredder
D) Burn it

A

Answer: B) Recycle facility

144
Q

Put the correct documentation steps in order:
1) Identify issue
2) Record actions taken
3) Record resolution
4) Close ticket

A
  1. Identify issue
  2. Record actions taken
  3. Record resolution
  4. Close ticket
145
Q

Put the steps for setting up a new user in order:
1) Create user account
2) Assign permissions
3) Provide documentation
4) Verify access

A
  1. Create user account
  2. Assign permissions
  3. Provide documentation
  4. Verify access
146
Q

Put the data disposal process in correct order:
1) Backup if needed
2) Wipe drive
3) Verify wipe
4) Recycle hardware

A
  1. Backup if needed
  2. Wipe drive
  3. Verify wipe
  4. Recycle hardware
147
Q

Arrange the steps of change management:
1) Submit change request
2) Evaluate risk
3) Approve change
4) Implement change

A
  1. Submit change request
  2. Evaluate risk
  3. Approve change
  4. Implement change
148
Q

Put the incident response steps in order:
1) Identify incident
2) Contain impact
3) Document
4) Notify stakeholders

A
  1. Identify incident
  2. Contain impact
  3. Notify stakeholders
  4. Document