Operational Procedures + General Safety Flashcards
How should you put out an electrical fire?
with a Class C fire extinguisher
For electrical fires, you should always use special dry fire prevention or extinguishing chemicals. Carbon dioxide is one of those chemicals.
What do you read or access to make sure you’re disposing of computer components correctly?
The SDS (Safety Data Sheet)
Who makes the Safety Data Sheets and distributes them for use?
OSHA (Occupational Safety and Health Administration)
What should the humidity and temperature settings be around electronics, servers, or computers?
A balanced setting. Not too hot, cold, or humid. Somewhere in the middle to protect against too much ESD (electrostatic discharge) or too much condensation in the room. Look at the SDS (safety data sheet) to make sure.
What kind of vacuum should you use to clean out printers or other electronics?
An anti-static vacuum that is specifically designed to not damage electronic components.
How do you measure and see how much of a surge can a surge protector take?
joule rating
The amount of surge a suppressor can handle will be measured in joules. A higher rating in this category will equate to being able to protect more effectively against higher voltages on the line.
What are the purpose of enclosures in factory or warehouse settings?
Enclosures house computers or electrical components to protect them from airborne particles and dust moving around in an environment.
What’s the purpose of open source software?
Open source programs have their source code freely available for others to edit and make changes to it as they see fit. Some feel that the software program will be even better if the public is able to evaluate it and make recommendations based on the code itself, leading to a more robust piece of software.
personally identifiable information (PII)
name, date of birth, employment details, SSN, and address are all PII (personally identifiable information).
High school teacher’s name would not lead to any personal information.
What is the first step when performing incident response after an incident has happened?
Confirm an incident actually did happen.
THEN you can ensure documentation, take pictures, and access Chain of Custody.
Why is establishing a Chain of Custody important when responding after an incident?
to preserve information
It is vital to preserve information to maintain the integrity of the collected evidence. If everything is not accurately and timely documented when switching hands, this could come under attack and be thrown out in a serious investigation.
What should you do when dealing with a difficult customer?
Don’t seem defensive or argumentative, clarify the issue, don’t vent on social media ever
What is the first step in the troubleshooting theory?
Identify the problem.
It is always good to identify what the actual issue is. This will ensure you are not wasting time troubleshooting something that was not the actual reported problem. Do this by first asking clarification questions in order to establish a solid base understanding.
Why do you document everything you do when troubleshooting and resolving issues?
To make sure the resolution processes are efficient.
When you document the issue, the actions you took, and the resolution, you essentially create a trail for other professionals to follow when they encounter similar issues. Also, if the same problem occurs, it allows you to look at the history to see if there is a pattern, or if maybe a different preventive measure should be taken (such as replacing equipment or going with a different vendor). All these things render the documentation process capable of making the troubleshooting flow more efficient.
After establishing a likely cause to a problem, what action should you take next? (Troubleshooting theory)
Test the theory.
According to the troubleshooting theory from CompTIA test materials, after establishing the theory or probable cause, you should now test that theory to see if you were correct. This lets you know if you are ready to move on to an action plan, or need to backtrack and work on establishing a new probable cause.
What are the steps to the troubleshooting theory?
- Identify the problem.
- Test the theory.
- Come up with an action plan, or backtrack to get another cause of the problem.
- Act on the plan, and implement preventative measures to make sure the problem doesn’t happen again.
- Verify your actions fixed the problem and system functionality.
- Document the findings.
Acceptable Use Policy (AUP)
policy put in place by an organization that states which types of actions are acceptable to perform using their equipment.
Many organizations implement acceptable use policies which state how employees are allowed to use their company-owned devices. Whenever accessing a public wi-fi, such as at a coffee shop (like Starbucks™), you will have to acknowledge the AUP before getting access to the network.
What is the acceptable cleaning method for cleaning out inside of computer parts?
Compressed air - preferably natural compressed air.
Compressed air can be used to clean out the inside of computer equipment, as well as printers or other devices. It is better to use natural compressed air versus any chemical-based compressed material.
GDPR (General Data Protection Regulation)
regulation based on data protection and privacy within the European Union.
Would be a concern for businesses operating in the European Union.
Python script files are written with the extension (at the end) with -
.py
A .py script is a script written in the Python programming language.
What is the alternative for telnet and why? Why is telnet not used often nowadays?
SSH (Secure Shell) is the alt. for telnet.
Telnet is not very secure, so SSH has mostly replaced telnet for communication over the network. SSH is also a terminal-based program with no graphical interface. SSH operates on port 22.
Before you start working on any system, what do you do?
Read any required documentation or manufacturor booklet/manual.
Documentation includes items such as processes and procedures, network diagrams, knowledge base articles (also known as KBs), and much more. It’s also important to document any fixes that have been implemented so they can be referenced later.
Another example of documentation includes Safety Data Sheets or SDS (formerly referred to as Material Safety Data Sheets or MSDS). The SDS outlines the procedures for disposing of hazardous materials. This should be referenced if there is a question about properly disposing of hazardous material. The SDS is administered by the Occupational Safety and Health Administration (OSHA) within the United States.
SDS (Safety Data Sheets)
(formerly referred to as Material Safety Data Sheets or MSDS). The SDS outlines the procedures for disposing of hazardous materials. This should be referenced if there is a question about properly disposing of hazardous material. The SDS is administered by the Occupational Safety and Health Administration (OSHA) within the United States.
Network topology diagrams
extremely helpful for performing any network upgrades or even to troubleshoot networking problems.
The network topology diagrams will provide a visual representation of how the network is laid out, including both logical and physical information for the devices.
Visio is a popular tool used when creating network diagrams.
Knowledge base / repository
repository of information regarding an application or system. When working on a system or troubleshooting an issue, individuals should first visit the systems knowledge base to see if a solution to their issue already exists.
Order of operations of incident documentation?
First response: The first step is the proper confirmation that an incident has happened, or is taking place. You should gather as much information as possible on the event, and report it through the proper authorized channels at the organization. These items will be outlined in a sound security policy.
Documentation: The next step is to document as much as possible. You can make use of pictures, scratch notes, or event logs to collect and assemble this information.
Chain of custody: Lastly, you want to make sure the information you have is preserved, especially in the event that information changes. Maintaining the integrity of the information is the most important step from this point forward. Any unaccounted changes could call into question the reliability of the information, making any work done since the first step useless.
What are the different codes that are in the regulatory and compliance policy?
When dealing with a networking environment, there are several regulations to keep in mind.
These include:
* electrical codes for running high/low voltage cabling,
* environmental codes for disposing of chemicals or hardware,
* fire prevention codes requiring the specific use of dry or wet systems, and
* building codes that specify how cabling can be run through a building.