Operational Procedures: implement best practices associated with documentation and support systems information management Flashcards

CompTIA A+ 220-1102 Exam Criteria

1
Q

What are the ticketing best practice?

A

Ticketing systems (Best Practice)

  User information 

   Device information 

   Description of problems 

   Categories 

   Severity 

   Escalation levels 

Clear, concise written communication

   Problem description 

   Progress notes 

   Problem resolution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why do we use a ticketing system?

A

Ticketing systems are required as part of jobs at the service desk or help desk. Other roles which include the use of ticketing systems include IT support analyst and IT support engineer. A ticket is a database entry that records the time, circumstances, applications, device, details, user name, contact information, time, date, and other data related to technical support queries.

An organization must track its assets, which are in the form of hardware, software, and data. With the implementation of asset management, you should track your tangible assets, such as software and hardware.

In this exercise, you will learn about the ticketing system process. You will also learn about various types of asset management best practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the Asset Management Best Practices?

A

Inventory lists

Database system

Asset tags and IDs (my asset tags)

Procurement life cycle

 1. Need identification 

 2. Vendor selection 

 3. Submit purchase requisition 

 4. Generate purchase order 

 5. Invoice and order 

Warranty and licensing

Assigned users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why we utilize Asset Management?

A

Asset management allows IT to track its assets and account for replacement and upgrades. Assets can be hardware, software and data.

When equipment enters the company, it should be labeled with an asset tag and barcode. The asset tag will have a numeric number, which should be entered into the asset management software used by the company.

There are applications available that can scan through the systems on the network and track the application licenses and collate their records in a single place. You can then verify if the systems are using legitimate applications or have exceeded the number of licenses.

Similarly, you need to track your data and most importantly, you need to know who is using which pieces of data. You can implement Data Loss Prevention and monitor your data. It prevents unauthorized sharing of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the type of documents Type is recommended to use?

A

Types of documents (Document Types)

      Regulatory compliance requirements  

                Splash screens – regulatory compliance advertised 

Acceptable use policy (AUP) - if you don’t follow you could be terminated.

Network topology diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why do we use inventory management?

A

Keeping track of the inventory is an important task for an IT support professional. You should track the complete details of the hardware that you have in the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What information is included in a inventory management?

A

Make

Model

Configuration (RAM, CPU, Hard drives)

Serial Number

Service Tag

Date of purchase

Any component (such as a hard drive) changes. If yes, then the date of change and possibly the configuration and serial number of the component

Assigned to

Date of assignment/release

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why do we use inventory management?

A

In the inventory management database, you also need to track information about devices assigned to users or if the item is gone for repair or replacement.

There are several benefits of inventory management. One of the biggest benefits is if the hardware, such as a laptop, is lost or stolen, you have the information needed to file an insurance claim or report to the police. Both of these processes would require a good amount of information, such as the make and model.

There is no fixed method for inventory management. It is up to you to choose a method. You could either use an inventory management application or simply track all the information in a spreadsheet. As long as you keep it updated, the method is your choice entirely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why do we use Asset tags?

A

Asset tags are used to track the hardware item. An asset tag has a barcode or a serial number. When you scan the barcode, the complete hardware details of the item are fetched from the inventory database.

For example, when you purchase an item from a store, the cashier simply scans the barcode on the item, and it is added for checkout.

You can use the asset tag, which will then be placed on each hardware item, such as a laptop, desktop, printers, servers, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the four Procurement lifecycle of devices?

A

Acquisition: This is the phase in which the organization procures the device. It becomes an asset and is most likely tagged with a specific number or similar identification method.

Implementation: This is the phase in which the device is implemented and put to use. It could be a laptop assigned to a user or a server commissioned on the network.

Maintenance: As and when a device breaks down, it is repaired. This is the maintenance phase. It could be a wear and tear in the device, such as malfunctioning of a network printer or a server’s hard drive crashes. These are maintenance activities that need to be tracked for each device so that the device’s history can be maintained.

Decommissioning: After the lifetime of a device is over, it is decommissioned. Some organizations donate older devices and systems, and others sell them off at a lower price. Each device or system within an organization has a specific lifetime beyond which it needs to retire or be disposed of.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Network Topology Diagram?

A

A network topology diagram is a visual representation of the network architecture. It uses different symbols and connections, which are represented by lines. A network diagram can help a user understand the layout of the network.

The network topology diagram should detail how the network is designed. It should mention the following:

Devices that are present on the network.

Connectivity between these devices.

IP addresses and names of these devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why do we use Regulatory and Compliance Policy?

A

A Regulatory and Compliance Policy defines the principles and standards for compliance and management of compliance risks in an organization. It ensures two key things:

Compliance risks are identified

Compliance risks are mitigated adequately

This policy applies to all business units, functions, and employees. The senior management or the organization is responsible for enforcing this policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is incident report so important in a business?

A

Every incident in an organization must be reported and documented. An incident could be small, such as one system getting infected with malware, or it could be big and severe in nature, such as a Distributed Denial-of-Service attack on your network. Every incident must be documented to keep the network secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do you need to include in a incident report?

A

To document the incident, you need to do the following tasks:

Identify the incident

Report the incident to the proper channels

Document the incident

Use chain-of-custody if the device or data is being handed to someone else for resolution

When it comes to Incident documentation, these are some of the characteristics that we find within the documentation:

Job ID

Contact

Priority

Problem description

Asset

Details

Follow up

Dates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do you do after you resolve an incident?

A

There may be a scenario in which you do not know what to do in an incident. You should report the incident to the appropriate authority, which could be your supervisor. You may be directed to the appropriate channel, or they will help you resolve the incident.

After the incident is resolved, it must be documented properly. The documentation must be prepared to keep the following in mind:

Provide specific details and descriptions of the incident. Try to be as specific as possible.

State facts only. Your opinions should be excluded.

Use an objective tone. Exclude any emotions when defining the incident.

List chronological incidents.

Use photos/evidence if possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do you need to be mindful of on SOP?

A

Standard Operating Procedures (SOP)

As the name states, standard operating procedures define a set of instructions to perform a specific task, an activity, or a process. Standard operating procedures are written to bring operational consistency into performing a specific task. Also, it minimizes errors because everyone follows the same set of instructions. For example, a standard operating procedure for custom installation of a software package will define the process to install any application with ease. All IT administrators within the organization will follow the same set of instructions.

When creating a standard operating procedure document, you need to ensure the following components are added:

Purpose

Scope

Responsibilities

Definitions

Procedures

Standard operating procedures are different from work instructions. It’s more focused on what needs to be done. Work instructions focus on how something needs to be done and use a step-by-step instructions approach.

17
Q

What do you need to ensure that is completed on New-User Setup Checklist?

A

Imagine that an organization hires you. On your first day, you have no clue what to do and whom to contact. The HR team is too busy to help you out. This can be an issue for the hired individual. It also adds a negative impression on the organization. The HR teams in most organizations have onboarding processes and procedures, which help the individual settle down. The onboarding processes also include the IT part. When you complete your joining formalities, the IT team does the following:

Assign a system or laptop

Assign a user account and email

Assign a workstation

Assign access to network resources

18
Q

What do you need to ensure that is completed on End-User Termination Checklist?

A

End-User Termination Checklist

Just like onboarding, the HR team usually has offboarding processes and procedures. IT again plays a critical role. For example, the IT team will;

Handle the handover of the system or laptop

Backup the system or laptop (if required) or handover the system or laptop to the team or manager

Deletion or Deactivation of user account and email

Completion of data or project handover

As part of the end-user termination checklist, a user may be required to complete documentation that serves as an input for the next employee who will replace the user.

19
Q

Why do we need knowledge base/Articles?

A

A knowledge base is an online library of articles or information snippets, which can help a learner find information quickly. Most organizations use the knowledge base to maintain information in a central place. The information could be related to HR, IT, or any other department in the organization.

For example, an IT support professional would have contributed to troubleshooting several complex problems. Other than them, it is possible that no one in the organization really knows how to troubleshoot those problems if they occur again. The IT support professional could contribute to the knowledge base by writing articles on those problems. They may cover information such as:

Nature of the problem

Cause of the problem

Step-by-step solution implemented

In the future, if the same set of problems occurs, team members can be directed to the knowledge base article. This cuts down on the time taken to resolve a problem.

An organization can also use a knowledge base for onboarding new employees, sharing policies, etc. A lot of product development organizations also use knowledge base for sharing information about their software. Users can be left clueless if they do not have product information.

Microsoft makes extensive use of the knowledge base. Microsoft Support provides troubleshooting information on their knowledge base. The user can select the product and then find the information they are looking for. The user can either search the knowledge base or view some of the most commonly asked questions.

Wikipedia can also be considered a knowledge base. Different users are allowed to contribute information. On the other hand, Microsoft does not allow external user contributions.