Operational Procedures Flashcards
Policy
A statement describing how management intends the organization is to be run.
Guideline
A description of best practices or recommendations for achieving a certain policy goal.
Power surge
An increase in voltage that can last several seconds and damage equipment.
Brownout
A drop in voltage, which may cause electronic devices to fail or behave unpredictably.
Blackout
A complete interruption of the power supply, lasting any duration.
Surge suppressor
A single strip designed to protect a few devices by preventing power surges or spikes from reaching sensitive equipment.
Safety Data Sheet (SDS)
A sheet which includes safety and health information about chemical products, including health risks and storage, disposal recommendations, and procedures for containing a leak or a spill.
Fault tolerance
The ability of a system to continue operating in at least partial capacity despite the failure of one or more components.
About policies: Policy
A statement describing how management intends the organization is to be run.
About policies: Standard
A technical definition of specific methodologies or requirements which are needed to satisfy policies.
About policies: Guideline
A description of best practices or recommendations for achieving a certain policy goal.
About policies: Procedures
Specific and ordered instructions for complying with a particular element of a policy or standard.
Acceptable use policies: Internet
A restrictive internet policy could prohibit any personal internet use on company systems.
Acceptable use policies: Company accounts
Use of company email accounts, website or social media accounts, or any other resources that associate the user with the organization itself need special scrutiny.
Acceptable use policies: Hardware and software
Policies should define both what hardware and software users have access to and what changes they can make.
Acceptable use policies: Privileged users
Administrators and other privileged users can easily do damage to network function or security than ordinary users, so they should face additional impressibilities and obligations.
List the six steps in the change management process?
- Identification
- Change request
- Approval
- Preparation
- Implementation
- Followup
the change management process: Identification
Identifying and documenting the reason why a change is necessary.
the change management process: Change request
Researching and documenting the steps needed for the change, its potential impact, and who will be affected.
the change management process: Approval
Going through your organization’s approval process for the specific change.
the change management process: Preparation
Gathering necessary resources, scheduling the change, and notifying users.
the change management process: Implementation
Making and testing the change.
the change management process: Followup
Monitoring for negative impacts and changing network documentation.
Which is a formal request for the implementation of a change?
RFC
A change-advisory board (CAB) delivers support to a change-management team by advising on requested changes, assisting in the assessment, and prioritization of changes. True or False?
True
password policies: Passwords should be easy for the user to remember, but difficult for an attacker to guess. true or false?
true
password policies: Multiple sign-on is an effective solution to users struggling with multiple separate passwords. true or false?
false
password policies: Passwords alone are a multi-factor that cannot be easily compromised. true or false?
false
password policies: Passwords should never be shared between users or given to unauthorized people. true or false?
true