Operational Procedures: implement best practices associated with documentation and support systems information management Flashcards
CompTIA A+ 220-1102 Exam Criteria
What are the ticketing best practice?
Ticketing systems (Best Practice)
User information Device information Description of problems Categories Severity Escalation levels
Clear, concise written communication
Problem description Progress notes Problem resolution
Why do we use a ticketing system?
Ticketing systems are required as part of jobs at the service desk or help desk. Other roles which include the use of ticketing systems include IT support analyst and IT support engineer. A ticket is a database entry that records the time, circumstances, applications, device, details, user name, contact information, time, date, and other data related to technical support queries.
An organization must track its assets, which are in the form of hardware, software, and data. With the implementation of asset management, you should track your tangible assets, such as software and hardware.
In this exercise, you will learn about the ticketing system process. You will also learn about various types of asset management best practices.
What are the Asset Management Best Practices?
Inventory lists
Database system
Asset tags and IDs (my asset tags)
Procurement life cycle
1. Need identification 2. Vendor selection 3. Submit purchase requisition 4. Generate purchase order 5. Invoice and order
Warranty and licensing
Assigned users
Why we utilize Asset Management?
Asset management allows IT to track its assets and account for replacement and upgrades. Assets can be hardware, software and data.
When equipment enters the company, it should be labeled with an asset tag and barcode. The asset tag will have a numeric number, which should be entered into the asset management software used by the company.
There are applications available that can scan through the systems on the network and track the application licenses and collate their records in a single place. You can then verify if the systems are using legitimate applications or have exceeded the number of licenses.
Similarly, you need to track your data and most importantly, you need to know who is using which pieces of data. You can implement Data Loss Prevention and monitor your data. It prevents unauthorized sharing of information.
What are the type of documents Type is recommended to use?
Types of documents (Document Types)
Regulatory compliance requirements Splash screens – regulatory compliance advertised
Acceptable use policy (AUP) - if you don’t follow you could be terminated.
Network topology diagram
Why do we use inventory management?
Keeping track of the inventory is an important task for an IT support professional. You should track the complete details of the hardware that you have in the organization.
What information is included in a inventory management?
Make
Model
Configuration (RAM, CPU, Hard drives)
Serial Number
Service Tag
Date of purchase
Any component (such as a hard drive) changes. If yes, then the date of change and possibly the configuration and serial number of the component
Assigned to
Date of assignment/release
Why do we use inventory management?
In the inventory management database, you also need to track information about devices assigned to users or if the item is gone for repair or replacement.
There are several benefits of inventory management. One of the biggest benefits is if the hardware, such as a laptop, is lost or stolen, you have the information needed to file an insurance claim or report to the police. Both of these processes would require a good amount of information, such as the make and model.
There is no fixed method for inventory management. It is up to you to choose a method. You could either use an inventory management application or simply track all the information in a spreadsheet. As long as you keep it updated, the method is your choice entirely.
Why do we use Asset tags?
Asset tags are used to track the hardware item. An asset tag has a barcode or a serial number. When you scan the barcode, the complete hardware details of the item are fetched from the inventory database.
For example, when you purchase an item from a store, the cashier simply scans the barcode on the item, and it is added for checkout.
You can use the asset tag, which will then be placed on each hardware item, such as a laptop, desktop, printers, servers, and so on.
What are the four Procurement lifecycle of devices?
Acquisition: This is the phase in which the organization procures the device. It becomes an asset and is most likely tagged with a specific number or similar identification method.
Implementation: This is the phase in which the device is implemented and put to use. It could be a laptop assigned to a user or a server commissioned on the network.
Maintenance: As and when a device breaks down, it is repaired. This is the maintenance phase. It could be a wear and tear in the device, such as malfunctioning of a network printer or a server’s hard drive crashes. These are maintenance activities that need to be tracked for each device so that the device’s history can be maintained.
Decommissioning: After the lifetime of a device is over, it is decommissioned. Some organizations donate older devices and systems, and others sell them off at a lower price. Each device or system within an organization has a specific lifetime beyond which it needs to retire or be disposed of.
What is Network Topology Diagram?
A network topology diagram is a visual representation of the network architecture. It uses different symbols and connections, which are represented by lines. A network diagram can help a user understand the layout of the network.
The network topology diagram should detail how the network is designed. It should mention the following:
Devices that are present on the network.
Connectivity between these devices.
IP addresses and names of these devices.
Why do we use Regulatory and Compliance Policy?
A Regulatory and Compliance Policy defines the principles and standards for compliance and management of compliance risks in an organization. It ensures two key things:
Compliance risks are identified
Compliance risks are mitigated adequately
This policy applies to all business units, functions, and employees. The senior management or the organization is responsible for enforcing this policy.
Why is incident report so important in a business?
Every incident in an organization must be reported and documented. An incident could be small, such as one system getting infected with malware, or it could be big and severe in nature, such as a Distributed Denial-of-Service attack on your network. Every incident must be documented to keep the network secure.
What do you need to include in a incident report?
To document the incident, you need to do the following tasks:
Identify the incident
Report the incident to the proper channels
Document the incident
Use chain-of-custody if the device or data is being handed to someone else for resolution
When it comes to Incident documentation, these are some of the characteristics that we find within the documentation:
Job ID
Contact
Priority
Problem description
Asset
Details
Follow up
Dates
What do you do after you resolve an incident?
There may be a scenario in which you do not know what to do in an incident. You should report the incident to the appropriate authority, which could be your supervisor. You may be directed to the appropriate channel, or they will help you resolve the incident.
After the incident is resolved, it must be documented properly. The documentation must be prepared to keep the following in mind:
Provide specific details and descriptions of the incident. Try to be as specific as possible.
State facts only. Your opinions should be excluded.
Use an objective tone. Exclude any emotions when defining the incident.
List chronological incidents.
Use photos/evidence if possible.