Operational Procedures + General Safety Flashcards

1
Q

How should you put out an electrical fire?

A

with a Class C fire extinguisher

For electrical fires, you should always use special dry fire prevention or extinguishing chemicals. Carbon dioxide is one of those chemicals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do you read or access to make sure you’re disposing of computer components correctly?

A

The SDS (Safety Data Sheet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who makes the Safety Data Sheets and distributes them for use?

A

OSHA (Occupational Safety and Health Administration)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What should the humidity and temperature settings be around electronics, servers, or computers?

A

A balanced setting. Not too hot, cold, or humid. Somewhere in the middle to protect against too much ESD (electrostatic discharge) or too much condensation in the room. Look at the SDS (safety data sheet) to make sure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What kind of vacuum should you use to clean out printers or other electronics?

A

An anti-static vacuum that is specifically designed to not damage electronic components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you measure and see how much of a surge can a surge protector take?

A

joule rating

The amount of surge a suppressor can handle will be measured in joules. A higher rating in this category will equate to being able to protect more effectively against higher voltages on the line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the purpose of enclosures in factory or warehouse settings?

A

Enclosures house computers or electrical components to protect them from airborne particles and dust moving around in an environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s the purpose of open source software?

A

Open source programs have their source code freely available for others to edit and make changes to it as they see fit. Some feel that the software program will be even better if the public is able to evaluate it and make recommendations based on the code itself, leading to a more robust piece of software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

personally identifiable information (PII)

A

name, date of birth, employment details, SSN, and address are all PII (personally identifiable information).

High school teacher’s name would not lead to any personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the first step when performing incident response after an incident has happened?

A

Confirm an incident actually did happen.

THEN you can ensure documentation, take pictures, and access Chain of Custody.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is establishing a Chain of Custody important when responding after an incident?

A

to preserve information

It is vital to preserve information to maintain the integrity of the collected evidence. If everything is not accurately and timely documented when switching hands, this could come under attack and be thrown out in a serious investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What should you do when dealing with a difficult customer?

A

Don’t seem defensive or argumentative, clarify the issue, don’t vent on social media ever

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the first step in the troubleshooting theory?

A

Identify the problem.

It is always good to identify what the actual issue is. This will ensure you are not wasting time troubleshooting something that was not the actual reported problem. Do this by first asking clarification questions in order to establish a solid base understanding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why do you document everything you do when troubleshooting and resolving issues?

A

To make sure the resolution processes are efficient.

When you document the issue, the actions you took, and the resolution, you essentially create a trail for other professionals to follow when they encounter similar issues. Also, if the same problem occurs, it allows you to look at the history to see if there is a pattern, or if maybe a different preventive measure should be taken (such as replacing equipment or going with a different vendor). All these things render the documentation process capable of making the troubleshooting flow more efficient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

After establishing a likely cause to a problem, what action should you take next? (Troubleshooting theory)

A

Test the theory.

According to the troubleshooting theory from CompTIA test materials, after establishing the theory or probable cause, you should now test that theory to see if you were correct. This lets you know if you are ready to move on to an action plan, or need to backtrack and work on establishing a new probable cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the steps to the troubleshooting theory?

A
  • Identify the problem.
  • Test the theory.
  • Come up with an action plan, or backtrack to get another cause of the problem.
  • Act on the plan, and implement preventative measures to make sure the problem doesn’t happen again.
  • Verify your actions fixed the problem and system functionality.
  • Document the findings.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Acceptable Use Policy (AUP)

A

policy put in place by an organization that states which types of actions are acceptable to perform using their equipment.

Many organizations implement acceptable use policies which state how employees are allowed to use their company-owned devices. Whenever accessing a public wi-fi, such as at a coffee shop (like Starbucks™), you will have to acknowledge the AUP before getting access to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the acceptable cleaning method for cleaning out inside of computer parts?

A

Compressed air - preferably natural compressed air.

Compressed air can be used to clean out the inside of computer equipment, as well as printers or other devices. It is better to use natural compressed air versus any chemical-based compressed material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

GDPR (General Data Protection Regulation)

A

regulation based on data protection and privacy within the European Union.

Would be a concern for businesses operating in the European Union.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Python script files are written with the extension (at the end) with -

A

.py

A .py script is a script written in the Python programming language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the alternative for telnet and why? Why is telnet not used often nowadays?

A

SSH (Secure Shell) is the alt. for telnet.

Telnet is not very secure, so SSH has mostly replaced telnet for communication over the network. SSH is also a terminal-based program with no graphical interface. SSH operates on port 22.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Before you start working on any system, what do you do?

A

Read any required documentation or manufacturor booklet/manual.

Documentation includes items such as processes and procedures, network diagrams, knowledge base articles (also known as KBs), and much more. It’s also important to document any fixes that have been implemented so they can be referenced later.

Another example of documentation includes Safety Data Sheets or SDS (formerly referred to as Material Safety Data Sheets or MSDS). The SDS outlines the procedures for disposing of hazardous materials. This should be referenced if there is a question about properly disposing of hazardous material. The SDS is administered by the Occupational Safety and Health Administration (OSHA) within the United States.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SDS (Safety Data Sheets)

A

(formerly referred to as Material Safety Data Sheets or MSDS). The SDS outlines the procedures for disposing of hazardous materials. This should be referenced if there is a question about properly disposing of hazardous material. The SDS is administered by the Occupational Safety and Health Administration (OSHA) within the United States.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Network topology diagrams

A

extremely helpful for performing any network upgrades or even to troubleshoot networking problems.

The network topology diagrams will provide a visual representation of how the network is laid out, including both logical and physical information for the devices.

Visio is a popular tool used when creating network diagrams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Knowledge base / repository

A

repository of information regarding an application or system. When working on a system or troubleshooting an issue, individuals should first visit the systems knowledge base to see if a solution to their issue already exists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Order of operations of incident documentation?

A

First response: The first step is the proper confirmation that an incident has happened, or is taking place. You should gather as much information as possible on the event, and report it through the proper authorized channels at the organization. These items will be outlined in a sound security policy.

Documentation: The next step is to document as much as possible. You can make use of pictures, scratch notes, or event logs to collect and assemble this information.

Chain of custody: Lastly, you want to make sure the information you have is preserved, especially in the event that information changes. Maintaining the integrity of the information is the most important step from this point forward. Any unaccounted changes could call into question the reliability of the information, making any work done since the first step useless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the different codes that are in the regulatory and compliance policy?

A

When dealing with a networking environment, there are several regulations to keep in mind.

These include:
* electrical codes for running high/low voltage cabling,
* environmental codes for disposing of chemicals or hardware,
* fire prevention codes requiring the specific use of dry or wet systems, and
* building codes that specify how cabling can be run through a building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

AUP (Acceptable Use Policy)

A

policy put in place by an organization that states which types of actions are acceptable to perform using their equipment. Many organizations implement acceptable use policies which state how employees are allowed to use their company-owned devices. Whenever accessing a public wi-fi, such as at a coffee shop like Starbucks™, you will have to acknowledge the AUP before getting access to the network.

29
Q

Inventory Management

A

process of maintaining a database of which devices and systems exist within an organization. Inventory management is often done using a third-party program to keep track of devices within larger organizations.

An asset tag is a method of inventory management. By adding asset tags to devices, it’s easier to keep track of devices, including who has the device and where they are located.

Barcodes are types of asset tags that can be easily scanned to keep track of the devices.

30
Q

Change Management / Management Change

A

process of addressing changes within an organization. Whenever a change is going to be made in an organization, proper procedures must be followed to ensure that any negative impact on the business or users is minimized.

  • all changes and processes are documented
  • a cost-benefit analysis is done to see if change is worth the cost to implement and re-train staff.
  • document the scope of the change and outline which items will be modified.
  • a risk analysis is done to accept, mitigate, or avoid the risks involved.
  • plan for changes that come up.
  • end-user acceptance must be done to ensure all users are on board for the change so it doesn’t affect productivity negatively.
  • CAB (change advisory board) is done to approve and oversee the changes made in the project.
  • A backout plan is made.
31
Q

What does a backup test do?

A

Serves to show that the backup files are not corrupt - shows they are backing up everything that would need to be restored in the event of a disaster.

Need to be conducted regularly.

32
Q

UPS - Uninterruptible Power Supply

A

an electrical device which provides power to a device in the event that the main power source fails

If servers are not properly shut down, they can be damaged. This means that if there were to be a power outage, the server operating systems or applications may become corrupt. In order to prevent this type of scenario, systems should be plugged into an uninterruptible power supply (UPS).

The UPS will automatically activate and provide power for the connected equipment via batteries

33
Q

surge protector

A

counters a spike in voltage and send the excess power to the ground

Surges occur when there is a spike in voltage or noise along the line.

34
Q

What’s the difference between cloud storage and local storage (such as tape backups) for organizations?

A

Cloud storage is controlled by an outside party and the owner doesn’t have full control over it; local backups are managed entirely by the owner.

35
Q

What is equipment grounding?

A

a way to transport any excess electrical discharge away from the component and into the electrical ground wiring.

This is a safety mechanism that is included on all outlets, significantly reducing the risk of electrical shock should there be a fault within the system.

36
Q

What are the four ways to manage ESD (electrostatic discharge)?

A
  • antistatic bags: stores computer components and ensures minimal static buildup
  • ESD straps: reduce electrostatic presence
  • ESD mat: mat person stands on or the equipment is put on to lower electrostatic risk
  • self-grounding actions: taking actions before working inside a computer (working on hardwood tables, hard floors, wearing cotton clothing, working in higher humidity environments, running hand across bare metal of a computer case before reaching inside it).
37
Q

What are the different toxic wastes to be aware of and how do you handle them?

A
  • batteries: wear protective goggles, take to waste facilities
  • toner: wear goggles, use air filters
  • CRT (cathode ray tube): wear goggles, electrician gloves, take to waste facilities.
  • cell phones: take to electronic recycle facility.
  • tablets: take to a recycling center.
38
Q

What’s usually the first steps to working on a computer?

A
  • all power sources should be disconnected.
  • also, read the manual or documentation before you start.
  • take off all jewelry or anything hanging from the body.
39
Q

How do you put out an electrical fire?

A

Use specialized dry fire prevention or extinguishing chemicals (Class C), such as carbon dioxide.

Never use wet chemicals or water on electric fires.

40
Q

Where do you reference how to properly dispose of hazardous material?

A

the SDS (safety data sheet) or MSDS from OSHA (Occupational Safety/Health Administration)

41
Q

What temperature, humidity, and ventilation do electronics “like”?

A

it is usually best to balance the humidity as efficiently as possible to avoid extreme condensation or static discharge.

It is also important to keep a closed-in area well ventilated so the room does not become too hot when the equipment is running.

42
Q

In a place that there are airborne particles like dust, smoke, or others are, what two methods do you use to manage the environment?

A
  • enclosures: to put computers and equipment in (plants or factory locations)
  • air filters and masks: protects workers and people in these places
43
Q

In order to clean out dust and other small particles out of computers, what do you use?

A
  • compressed air (natural compressed air is preferred)
  • vacuums (specialized anti-static vacuums)
44
Q

U.S. Environmental Protection Agency (EPA)

A

this agency administers environmental concerns nationally

45
Q

on site vs. off site backup rotation schemes

A
46
Q

3-2-1 Backup Rule

A

you should have 3 copies of your data (your production data and 2 backup copies) on two different media (disk and tape) with one copy off-site for disaster recovery.

47
Q

What is a full, incremental, differential, and synthetic backup?

A
  • Full backup: very first backup you create of your data. You start with nothing—no backup—and then you make a complete copy of your data.
  • Incremental backup: copy the data that has changed or has been added since your last full backup and then, any newly changed or added data since the previous incremental backup. File-level and block-level.
  • Differential backup: are popular for database applications like Microsoft SQL but not used frequently otherwise. Differential backups look at the last full backup only, and they collect the changes from the full backup. As you make changes to your original data set (the one in the full backup), your differential backup grows.
  • In a synthetic full backup, your backup software takes your previous full backup and all the incremental backups you’ve created over a set period of time and combines them into a new full, synthesized backup. Your new synthetic backup contains the same data as an active full backup.
48
Q

GFS (Grandfather-father-son) backup

A

common rotation scheme for backup media,[1] in which there are three or more backup cycles, such as daily, weekly and monthly. The daily backups are rotated on a daily basis using a FIFO system as above. The weekly backups are similarly rotated on a weekly basis, and the monthly backup on a monthly basis. In addition, quarterly, half-yearly, and/or annual backups could also be separately retained. Often some of these backups are removed from the site for safekeeping and disaster recovery purposes.

49
Q

What’s the difference between an open source and a commercial license?

A

An open source license means that the software’s source code is freely available to the public. This means the software can be modified and recreated if desired by the end user.

A commercial license is usually closed source, meaning the source code is not available to the general public.

50
Q

What’s the difference between a personal license and an enterprise license?

A

A personal license is granted only to one end user for recreational purposes. At times, costly commercial software will license its product for non-commercial use to an individual or student, and this is intended for personal use only.

Enterprise licenses are intended for business use, typically by larger organizations, and are a form of paid commercial software licensed to the company for a certain number of users.

51
Q

Steps of Incident Response

A

The first step is the proper confirmation that an incident has happened, or is taking place. You should gather as much information as possible on the event and report it through the proper authorized channels at the organization. These items will be outlined in a sound security policy.

Identify— We have tasks to complete every day. While completing these, if something looks different, then you have just identified something. By using checklists and following these checklists as a daily task, you are more likely to identify an incident long before it possibly affects the system.

Report— Once confirmed, ensure others in your chain of command are notified that an incident has occured. Document the person and title you informed as well as the time they were informed. Having a standard report form will assist in this procedure.

Preserve— To obtain a full incident overview, preservation is paramount. Ensuring that the evidence remains intact and undisturbed will preserve the incident for investigation.
Documentation

The next step is to document as much as possible and continue documentation as changes are made to the incident. You can make use of pictures, scratch notes, or event logs to collect and assemble this information.
Chain of Custody

Lastly, you want to make sure the information you have is preserved, especially in the event that information changes. Maintaining the integrity of the information is the most important step from this point forward. Any unaccounted changes could call into question the reliability of the information, making any work done since the first step useless.

Tracking of evidence— Evidence of an incident can be vital to proving the who, what, when, and how of the incident. Ensuring this evidence is maintained while the investigation is being completed should be conducted with evidence trackers and chain of custody logs. These can be generic forms or be generated internally, but should be started as soon as the documentation begins.

Documenting progress— During the investigation phase of the incident and all during the process, everything must be documented to maintain the incident. Any slight infraction can lead to “tainted” evidence and the investigation being sidelined.

52
Q

What are the types of regulated data from people, and why is it important to hold these at a higher standard than other types of data?

A

PII— Personally Identifiable Information: This is information that can be used as a means to identify employees within an organization, such as Social Security numbers and addresses. This information should remain very secure, and there should be clearly defined policies stating who can access it.

PCI— Payment Card Industry: Security standards that ensure all companies that accept, process, store, or transmit credit card information maintain the security of such information.

GDPR— General Data Protection Regulation: Regulations based on data protection and privacy within the European Union.

PHI— Protected Health Information: Information relating to health information of the person stored, transmitted or maintained in electronic or other forms. Subject to state and federal privacy and security rules, including the Health Insurance Portability and Accountability Act (HIPAA).

53
Q

What are the different script types and what do they mean?

A
  • .bat (batchfile): series of commands to be run by Windows OS stored in a plain text file.
  • .ps1 (powershell 1): used to run scripts in Powershell.
  • .vbs (visual basic script): contains lines of codes in the VB (visual basic) programming language which are encoded in plain text.
  • .sh (shell): like batch files of Windows, but CAN be executes in Linux or Unix.
  • .js (javascript): script written in Javascript.
  • .py (python): a script written in Python.
54
Q

Basic automation for scripting

A
  • You can script once, then leave.
  • You can solve problems in your sleep.
  • You can monitor and resolve problems before they happen.
  • The script is as fast as the computer.
  • There’s no errors or delays.
  • You can have freed up time to do whatever while the machine is doing a task for you.
55
Q

Restarting machines with script

A
  • Perform application updates and save changes.
  • Have security patches take effect.
  • Troubleshoot software.
56
Q

Remapping network drives

A
  • You can have shared network drives, the link between user and their data.
  • This is a common task during startup with script, and login scripts provide the connection.
  • You can automate software changes, to map a drive to the repository.
  • Add or move user data to automate that process.
57
Q

Application installations with script

A
  • You can install apps automatically on a computer with one script and you don’t have to walk a flash drive to every single computer.
  • Many apps have an automated installation process, to turn installation into a hands-off process.
  • You can install on-demand or automatic installation scripts to map the application, install it, disconnect the drive, and restart the system.
58
Q

Automated backups with script

A
  • Backups performed at night or during off hours to get a copy of all that important data (file systems and network connections) - all done by script.
59
Q

information gathering with script

A

With script, you can get information from a remote device by monitoring and reporting for performance, memory, uptime and availability.

We can do inventory management with scripts to check hardware/software configuration and make a list of the inventory we have.

We can also do security checks and vulnerability reports with scripts to plan for the latest patches, and check for certain app or library versions.

60
Q

With script, how can you initiate updates?

A
  • We can check new features and security patches with OSes.
  • We can also update device drivers, perform bug fixes, and have new hardware and OS support.
  • We can push new app version rollouts on devices.
61
Q

What are the concerns wtih scripting?

A
  • unintentionally introducing malware - make sure you know what you’re installing.
  • inadvertently changing system settings - test all updates, while tracking the files and registry changes.
  • causing browser or system crashes - always have a backup, be careful about what you’re typing, always test before deployment.
62
Q

RDP - Remote Desktop Protocol

A
  • primarily used for Windows, but there are clients for Mac OS, Linux, and others to use it.
  • An open port of TCP 3389 is a big tell that someone is trying to get access to your system via this port.
  • Brute force (guessing passwords) here is common until they get access.
63
Q

VNC - Virtual Network Computing

A
  • Remote Frame Buffer protocol
  • has clients for many operating systems
  • many are open source
64
Q

How would a hacker get to a system via remote-accessing it?

A
  • Seeing a Port of 3389 on Microsoft’s RDP (remote desktop protocol) is open and brute force guessing passwords until they get in.
  • Most secure remote desktops are just secured with a username and password - most people re-use them and therefore they’re easy to access.
  • Once hackers are in, they can jump to other systems, obtain personal information, and make purchases from the user’s browser.
65
Q

VPN (virtual private network)

A
  • encrypted (private) data traversing a public network.
  • everyone using a VPN is connecting to a central concentrator, which ensures encryption/decryption of the VPN tunnels.
  • VPN data on the network is very secure - one of the best.
  • Authentication is critical here - an attacker with the right credentials can gain access.
  • Almost always include multifactor authentication (MFA) to require more than just username/password.
66
Q

SSH (secure shell)

A
  • encrypted protocol
  • way to secure communicate at the command line of different devices
  • network traffic is encrypted - there’s nothing to see in the packets
  • authentication is a big deal - use private/public pre-determined keys, and only certain accounts should be allowed (like root account)
  • consider removing all password-based authentication and limit access to SSH by IP address (configure firewall or network router)
67
Q

RMM - remote monitoring and management

A

Managed Service Providers use this to manage a system from a remote location.

There’s many features to this like:
* patching operating systems
* remote login
* anomaly monitoring
* hardware/software inventory

  • This is a popular attack point because it has lots of information and control.
  • Access should be limited and don’t allow everyone to connect to the RMM service.
  • Auditing is important to know who is connecting to which devices and what they’re doing!
68
Q

MSRA - Microsoft Remote Assistance

A
  • A lot like the RDP (Remote Desktop Protocol) that microsoft has, BUT DOES provide access on demand, instead of already/constantly listening and waiting on a certain port. Avoids unintended access to the port.
  • no firewall configurations or port forwarding involved for the process to work
  • The user makes a request to get help with the system through “Invite someone you trust to help you” and sends an invite with the details… then a tech connects and uses the password in the request.
  • This has been replaced by Quick Assist in Windows 10 and Windows 11 - the latest version of MSRA.
  • You wouldn’t want to send the password over email, which is the least secure - instead, use the six digit passcode and say it over the phone/through voice communication.
69
Q

What third party tools have screen sharing, video conferencing, file transfer, and desktop management as functions?

A
  • Screen sharing programs like GoToMyPC and TeamViewer
  • Video conferencing (Zoom, WebX)
  • File Transfer to store and share documents (Google Drive, Dropbox, Box.com)
  • Desktop management to manage end user devices and OSes (Citrix EndPoint Management, ManageEngine Desktop Central)