Operational Procedures (4) Flashcards

1
Q

What term describes strings that specify script information such as path, drive, and filename?

Container configuration

Environment variables

Configuration variables

A

Environment variables

The environment variables, typically set in the first lines of a script, will specify the script’s path, filename, and file location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In what type of editor would you normally view a script with the filename extension .vbs?

Notepad

XLS

emacs

A

Notepad

Visual Basic scripts are run on Windows platforms, so the Linux/*nix based editors Emacs and vi would not be used to view a VB script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following commands could you find in a .sh script?

echo “Hello, World!”

pscreen “Hello, World!”

print (“Hello, World!”)

A

echo “Hello, World!”

A .sh file (Shell script) would use the echo command. The options with the print command are for Python version 2.7 and 3, respectively. There is no pscreen command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What plain-text script file would run on the operating system DOS?

.sh

.py

.bat

A

.bat

Batch scripting, which uses the filename extension .bat, is typically a series of DOS command-line commands. Such a script file would run on DOS, OS/2, and on the Windows systems’ command line. The other filename extensions—.js, .sh, and .py— are JavaScript, shell, and Python, respectively. They each would require special additional software to be able to interpret the script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What programming language uses the .js file?

JavaScript

Java

Juice

A

JavaScript

JavaScript uses the .js filename extension

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When writing a script, how do you declare comments from the scripting language?

Using an exclamation point (!) to start a comment

Using two slashes (//) to start a comment

Using appropriate comment syntax

A

Using appropriate comment syntax

Each scripting or programming language might use a different character to declare a comment. The first three options—semicolon, exclamation point, and two slashes—are for assembly, Fortran, and Java or C++, respectively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What scripting constructs help execute a command or series of commands repeatedly?

IF/THEN conditional statements

Basic loops

Variables

A

Basic loops

The basic loop can provide a technique to issue a command (or multiple commands) repeatedly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What scripting constructs are values or placeholders for the programmer to declare or fill during the script?

Basic loops

Environmentals

Variables

A

Variables

The variable in scripting and programming is a value that you can change, populate, and use during the script or program’s execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What data type is restricted to being a series of digits?

Array

Integer

Variable

A

Integer

Conventionally, for any scripting or programming language, an integer is only able to be a digit. It can be as long as you want, but it can only be digits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What best practice assists the administrator to track the boundaries and perimeters of data flow through the environment?

Change management

Password policy

Network topology diagrams

A

Network topology diagrams

Network topology diagrams will illustrate how the network connects and routes in and around the environment. Diagraming the network’s hardware and paths show a topology of perimeters and boundaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

hat best practice helps the administrator keep track of the hardware found throughout the workplace?

Asset tagging

Knowledgebase articles

Password policy

A

Asset tagging

Asset tagging hardware such as desktops and laptops can help an administrator quickly know the details of a particular asset. Inventory management is more easily accomplished with asset tagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which policy might lock a user out of a workstation if the wrong credentials were used too many times?

Acceptable use policy

Password policy

Change management policy

A

Password policy

Password policy would state the minimum requirements for passwords, including but not limited to length, complexity, history, and lockout conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The operations manager wants to employ asset management but does not wish to spend funds on equipping all hardware with RFID tags. What is an appropriate but less expensive option?

Sharpie

Color coding

Barcodes

A

Barcodes

Barcodes printed on physical tags that are then affixed to hardware to be managed are an inexpensive option to RFID asset tags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What describes the best practice of documenting learned experience and helpful content to be shared with others?

Brown bagging

Knowledge base article writing

Change board

A

Knowledge base article writing

Writing knowledge base articles to share with others, namely for those with similar tasks or duties in your environment, can be very helpful. Compared to the time and money spent on repeated discovery for a solution, writing knowledge base articles is a small investment. A change board is a list of expected or recent changes to the environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What change management detail is not necessary to document?

Scope of the change

Applications unaffected

Approval

A

Applications unaffected

Every documented change should include the reason or purpose of the change. The reason can explain the justification to those unfamiliar with the situation before the change. The scope of the change documents what is affected by the change. The approval, arguably the most important part, documents the management’s support of the change. Documenting what applications are not affected by the change is an unnecessary step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In documenting an anticipated change, what highlights how the change will be received by a sample of the employees?

Plan for change

Risk analysis

End-user acceptance

A

End-user acceptance

The backout plan documents the actions to take in the event the change is rejected for some reason. The plan for change documents detailed actions to take to implement the change. A risk analysis is performed to assess, and likely accept, any additional exposure caused by the change. But end-user acceptance documents that the change is welcomed and agreed upon by end users

17
Q

A company recently experienced an incident involving ransomware, corrupting the contents of a shared network folder. What basic disaster prevention and recovery method should an administrator implement?

Image level

File level

Employee level

A

File level

Implementing file level disaster prevention and recovery best practices will help quicken recovery from a similar incident in the future. If, for example, a virus spread across multiple desktops, then perhaps image level recovery procedures would be useful

18
Q

Due to policy, an administrator wrote and documented disaster prevention and recovery procedures. Finally, critical data was backed up as required. What should be done next before the implementation can be considered reliable?

Backup testing

Documenting a checklist

End-user acceptance

A

Backup testing

Until testing is done, backups cannot be considered reliable

19
Q

Which of the following would most likely be included in the scope of disaster prevention and recovery?

Users’ home folders

Network diagram changes

Critical applications

A

Critical applications

Applications, specifically critical applications, would most likely be backed up and recovered in the event of a disaster

20
Q

In a geographical area prone to tornados, what option for storing backups seems most sensible?

Tapes distributed among offices

Cloud storage off-site

Storage on a server against an inside wall

A

Cloud storage off-site

Depending on the disaster, the question of cloud storage vs. local storage backups can significantly affect the success of recovery. For example, for a server hardware failure or a recent malware incident, local storage provides adequate security of backups. However, catastrophic collapse of the building would mean local storage is not accessible

21
Q

During what type of recovery would someone typically answer security questions or provide a PIN code from a phone call or text?

Account recovery

File decryption

Expanding a zipped file

A

Account recovery

Account recovery, such as a forgotten username ID or password, often proceeds with a text or phone call to a documented phone number. Other examples include security questions, such as your first pet or mother’s maiden name

22
Q

When handling electrical or solid-state electronics, what is a common safety procedure that should be followed?

Remove shoes.

Remove jewelry.

Remove antistatic and ESD packaging.

A

Remove jewelry.

Jewelry is very often conductive, posing a risk of bridging electrical contacts. Shorting the connection between points might lead to permanent damage to components, let alone potentially causing injury to yourself. Common sense says to remove any jewelry before handling exposed electronics