Operational Procedures (4) Flashcards
What term describes strings that specify script information such as path, drive, and filename?
Container configuration
Environment variables
Configuration variables
Environment variables
The environment variables, typically set in the first lines of a script, will specify the script’s path, filename, and file location
In what type of editor would you normally view a script with the filename extension .vbs?
Notepad
XLS
emacs
Notepad
Visual Basic scripts are run on Windows platforms, so the Linux/*nix based editors Emacs and vi would not be used to view a VB script
Which of the following commands could you find in a .sh script?
echo “Hello, World!”
pscreen “Hello, World!”
print (“Hello, World!”)
echo “Hello, World!”
A .sh file (Shell script) would use the echo command. The options with the print command are for Python version 2.7 and 3, respectively. There is no pscreen command
What plain-text script file would run on the operating system DOS?
.sh
.py
.bat
.bat
Batch scripting, which uses the filename extension .bat, is typically a series of DOS command-line commands. Such a script file would run on DOS, OS/2, and on the Windows systems’ command line. The other filename extensions—.js, .sh, and .py— are JavaScript, shell, and Python, respectively. They each would require special additional software to be able to interpret the script
What programming language uses the .js file?
JavaScript
Java
Juice
JavaScript
JavaScript uses the .js filename extension
When writing a script, how do you declare comments from the scripting language?
Using an exclamation point (!) to start a comment
Using two slashes (//) to start a comment
Using appropriate comment syntax
Using appropriate comment syntax
Each scripting or programming language might use a different character to declare a comment. The first three options—semicolon, exclamation point, and two slashes—are for assembly, Fortran, and Java or C++, respectively
What scripting constructs help execute a command or series of commands repeatedly?
IF/THEN conditional statements
Basic loops
Variables
Basic loops
The basic loop can provide a technique to issue a command (or multiple commands) repeatedly
What scripting constructs are values or placeholders for the programmer to declare or fill during the script?
Basic loops
Environmentals
Variables
Variables
The variable in scripting and programming is a value that you can change, populate, and use during the script or program’s execution
What data type is restricted to being a series of digits?
Array
Integer
Variable
Integer
Conventionally, for any scripting or programming language, an integer is only able to be a digit. It can be as long as you want, but it can only be digits
What best practice assists the administrator to track the boundaries and perimeters of data flow through the environment?
Change management
Password policy
Network topology diagrams
Network topology diagrams
Network topology diagrams will illustrate how the network connects and routes in and around the environment. Diagraming the network’s hardware and paths show a topology of perimeters and boundaries
hat best practice helps the administrator keep track of the hardware found throughout the workplace?
Asset tagging
Knowledgebase articles
Password policy
Asset tagging
Asset tagging hardware such as desktops and laptops can help an administrator quickly know the details of a particular asset. Inventory management is more easily accomplished with asset tagging
Which policy might lock a user out of a workstation if the wrong credentials were used too many times?
Acceptable use policy
Password policy
Change management policy
Password policy
Password policy would state the minimum requirements for passwords, including but not limited to length, complexity, history, and lockout conditions
The operations manager wants to employ asset management but does not wish to spend funds on equipping all hardware with RFID tags. What is an appropriate but less expensive option?
Sharpie
Color coding
Barcodes
Barcodes
Barcodes printed on physical tags that are then affixed to hardware to be managed are an inexpensive option to RFID asset tags
What describes the best practice of documenting learned experience and helpful content to be shared with others?
Brown bagging
Knowledge base article writing
Change board
Knowledge base article writing
Writing knowledge base articles to share with others, namely for those with similar tasks or duties in your environment, can be very helpful. Compared to the time and money spent on repeated discovery for a solution, writing knowledge base articles is a small investment. A change board is a list of expected or recent changes to the environment
What change management detail is not necessary to document?
Scope of the change
Applications unaffected
Approval
Applications unaffected
Every documented change should include the reason or purpose of the change. The reason can explain the justification to those unfamiliar with the situation before the change. The scope of the change documents what is affected by the change. The approval, arguably the most important part, documents the management’s support of the change. Documenting what applications are not affected by the change is an unnecessary step
In documenting an anticipated change, what highlights how the change will be received by a sample of the employees?
Plan for change
Risk analysis
End-user acceptance
End-user acceptance
The backout plan documents the actions to take in the event the change is rejected for some reason. The plan for change documents detailed actions to take to implement the change. A risk analysis is performed to assess, and likely accept, any additional exposure caused by the change. But end-user acceptance documents that the change is welcomed and agreed upon by end users
A company recently experienced an incident involving ransomware, corrupting the contents of a shared network folder. What basic disaster prevention and recovery method should an administrator implement?
Image level
File level
Employee level
File level
Implementing file level disaster prevention and recovery best practices will help quicken recovery from a similar incident in the future. If, for example, a virus spread across multiple desktops, then perhaps image level recovery procedures would be useful
Due to policy, an administrator wrote and documented disaster prevention and recovery procedures. Finally, critical data was backed up as required. What should be done next before the implementation can be considered reliable?
Backup testing
Documenting a checklist
End-user acceptance
Backup testing
Until testing is done, backups cannot be considered reliable
Which of the following would most likely be included in the scope of disaster prevention and recovery?
Users’ home folders
Network diagram changes
Critical applications
Critical applications
Applications, specifically critical applications, would most likely be backed up and recovered in the event of a disaster
In a geographical area prone to tornados, what option for storing backups seems most sensible?
Tapes distributed among offices
Cloud storage off-site
Storage on a server against an inside wall
Cloud storage off-site
Depending on the disaster, the question of cloud storage vs. local storage backups can significantly affect the success of recovery. For example, for a server hardware failure or a recent malware incident, local storage provides adequate security of backups. However, catastrophic collapse of the building would mean local storage is not accessible
During what type of recovery would someone typically answer security questions or provide a PIN code from a phone call or text?
Account recovery
File decryption
Expanding a zipped file
Account recovery
Account recovery, such as a forgotten username ID or password, often proceeds with a text or phone call to a documented phone number. Other examples include security questions, such as your first pet or mother’s maiden name
When handling electrical or solid-state electronics, what is a common safety procedure that should be followed?
Remove shoes.
Remove jewelry.
Remove antistatic and ESD packaging.
Remove jewelry.
Jewelry is very often conductive, posing a risk of bridging electrical contacts. Shorting the connection between points might lead to permanent damage to components, let alone potentially causing injury to yourself. Common sense says to remove any jewelry before handling exposed electronics