RG: Ch 9: Operational Procedures Flashcards
Which of the following is written in Python?
A. .psi
B. .vbs
C. .sh
D. .pyc
D. .pyc
A .pyc file is one written in the Python language. Python runs on Windows, Mac OS X, and Linux/Unix. A .vbs file is a Visual Basic file. An SH file is a script programmed for Bash, a type of Unix shell. A .pyc file is a Python file.
Which of the following should the IT professional do when dealing with customers?
A. Use appropriate professional titles, when applicable
B. Take personal calls
C. Use the customer’s equipment for personal messages
D. Talk to co-workers while interacting with customers
A. Use appropriate professional titles, when applicable
You should use appropriate professional titles, when applicable, and never take personal calls, use the customers equipment for personal messages, or talk to co-workers while interacting with customers.
Which of the following is a number that can be written without a fractional component?
A. Integer
B. String
C. Variable
D. Loop
A. Integer
An integer (from the Latin integer meaning “whole”) is a number that can be written without a fractional component (1, 2, 3 but not 1.5, 1.6). A string is a series of characters. Variables are used to store information to be referenced and manipulated in a computer program. A loop is section of code that goes back to an earlier part of the script.
Which of the following is the least important piece of information to record about each device for proper asset inventory?
A. Make
B. Model
C. Serial number
D. Operating system
D. Operating system
While the OS may be important, for warranty issues these other pieces are more important. The make, model, and serial number are all important.
Which of the following ensures an escape from changes that break something?
A. Backout plan
B. Phased deployment
C. Communication process
D. Request control
A. Backout plan
During implementation, incremental testing should occur, relying on a predetermined fallback strategy if necessary. A phased deployment is one in which parts of the network are done at a time. While the communication process is important, it is not what allows for an escape. Request control is a process where change request are managed and approved.
Which of the following is not a safe lifting technique to keep in mind?
A. Lift with your back, not your legs
B. Be careful to not twist when lifting
C. Keep objects as close to your body as possible
D. Where possible, push instead of pull
A. Lift with your back, not your legs
Lift with your legs, not your back. When you have to pick something up, bend at the knees, not at the waist. The other options are all safety recommendation.
What class of fire extinguisher is used for paper fires?
A. A
B. B
C. C
D. D
A. A
A is for wood and paper fires, B is for flammable liquids, C is for electrical fires, and D is for metal fires.
Which of the following is the not part of the first response to an incident?
A. Shut down the affected system
B. Identify
C. Report though proper channels
D. Data/device preservation
A. Shut down the affected system
You never shut down the system until all volatile evidence has been collected. The other options are correct guidelines.
Which of the following applies to EU-based organizations that collect or process the personal data of EU residents?
A. PHI
B. PHI
C. GDPR
D. PCI-DSS
C. GDPR
Beginning on May 25, 2018, the members of the EU began applying the General Data Protection Regulation (GDPR). The GDPR applies to EU-based organizations that collect or process the personal data of EU residents and to organizations outside the EU that monitor behavior or offer goods and services to EU residents. Personally identifiable information (PII) is data like an XSN number that is unique to the individual. Personal health information (PHI) is confidential medical record. Payment Card Industry/ Data Security Standards (PCI-DSS) is a standard for protecting credit card data.
If you use differential backups every day except Monday when you do a full backup, how many backup tapes will be required if there is a drive failure on Wednesday after the backup has been made?
A. 4
B. 3
C. 2
D. 1
C. 2
Since a differential backup backs up everything that has changed since the last full backup, each day’s incremental tape contains what was on the previous day’s tape. So, you only need the last differential and the last full backups.
Any type of chemical, equipment, or supply that has the potential to harm the environment or people has to have what document associated with it?
A. SOW
B. MSDS
C. SLA
D. MOU
B. MSDS
Any type of chemical, equipment, or supply that has the potential to harm the environment or people has to have a material safety data sheet (MSDS) associated with it. These are traditionally created by the manufacturer, and you can obtain them from the manufacturer or from the Environmental Protection Agency. A statement of work (SOW) is a document that indicates the work to be performed. A service level agreement is a document that indicates what is being paid and what the service consists of. A memorandum of understanding (MOU) is a document that indicates the intent of two parties to do something together.
Which of the following is false regarding dealing with customers?
A. Always answer the telephone in a professional manner, announcing the name of the company and yourself
B. Make a concentrated effort to ascertain the customer’s technical level, and communicate above it
C. Use proper language (avoid jargon, acronyms, and slang when applicable)
D. Maintain a positive attitude/project confidence
B. Make a concentrated effort to ascertain the customer’s technical level, and communicate above it
If you’re providing phone support, do the following:
Always answer the telephone in a professional manner, announcing the name of the company and yourself.
Make a concentrated effort to ascertain the customer’s technical level, and communicate at that level, not above or below it.
The other options are all valid recommendations.
Which of the following is false with respect to change management?
A. All changes should be formally requested.
B. Each request should be analyzed to ensure it supports all goals and polices.
C. After formal approval, all costs and effects of the methods of implementation should be reviewed.
D. After they’re approved, the change steps should be developed.
C. After formal approval, all costs and effects of the methods of implementation should be reviewed.
All costs and effects of the methods of implementation should be reviewed prior to formal approval. The other statements are true.
What is the process called that ensures all configuration changes are beneficial?
A. Change management
B. Acceptable use
C. Separation of duties
D. Risk analysis
A. Change management
During the change management process, the relative costs and benefits to the overall organization will be weighed by a change management board or team. Acceptable use is a policy that defines what users can and cannot do. Separation of duties is a concept that says that any operation prone to fraud should be broken into two jobs and assigned to two people. Risk analysis is a process that identifies risk and mitigations.
Which of the following is a command-line tool?
A. RDP
B. Screen sharing
C. File sharing
D. SSH
D. SSH
If you don’t need access to the graphical interface and you just want to operate at the command line, you have two options, Telnet and SSH. While Telnet works just fine, it transmits all of the data in clear text, which obviously would be security issue. Remote Desktop and screen sharing are graphical concepts, while file sharing is not a command-line utility.