Supporting Network Operations Flashcards
System that is used to manage requests, incidents, and problems submitted by users
Ticketing Systems
Difference between Incident vs. Problem?
Incident – happen one time or are isolated issues
Problem – recurrent and happen to multiple users or devices with the same characteristics
4 aspects of a ticket
1) User information
2) Device information
3) Incident/Problem description
4) Ticket category (severity)
Systematic approach to the governance of value of things over their life cycle
Asset Management
2 ways to identify an asset
1) Asset Tag (barcode)
2) Asset ID (number)
Type of change that is preauthorized and can be implemented without any additional authorization
Standard Change
Type of change that changes where the authorization is gained
Normal Change
Type of change that needs to be expedited
Emergency Change
ECAB
Emergency Change Advisory Board
The 4 main types of Documentation types
1) Acceptable Use Policies (AUPs)
2) Standard Operating Procedures
3) Incident reports
4) Network topology diagrams
AUP
Acceptable Use Policy
SOP
Standard Operating Procedure
Your network administrator has handed you some documentation showing you which switch ports on a patch panel you need to connect with a CAT 5e patch cable for an upcoming network upgrade. What document are you MOST likely holding?
a) Process flow diagram
b) Physical network diagram
c) Inventory management diagram
d) Logical network diagram
b) Physical network diagram
A physical network diagram shows the actual physical arrangement of the components that make up the network, including cables and hardware. Typically, the diagram gives a bird’s eye view of the network in its physical space, like a floorplan. A network topology is the shape or structure of a network in a physical or logical format as depicted in a network diagram. Physical network topologies include the actual appearance of the network layout.
Dion Training is creating troubleshooting guides and frequently asked questions for its new customer service technicians. Which of the following would MOST likely contain these documents?
a) Password policy
b) Asset management database
c) Network topology diagram
d) Knowledge base articles
d) Knowledge base articles
A Knowledge Base (KB) is a reference document that is used to assist a technician when they are installing, configuring, and troubleshooting hardware and software. A knowledge base article might be created by a vendor to support their products, too. A company might create an internal KB, populated with guidelines, procedures, information, and frequently asked questions from their service tickets.
Which of the following should be used to uniquely identify every piece of hardware installed on the corporate network, including servers, desktops, laptops, printers, and monitors?
a) IP address
b) Asset ID
c) Location
d) MAC address
b) Asset ID
The asset ID should be used to uniquely identify each piece of hardware tracked in an asset management database. An asset management database can be configured to store as much or as little information as is deemed necessary. Typical data would be type, model, serial number, asset ID, location, user(s), value, and service information. Tangible assets can be identified using an identification number, barcode label, or Radio Frequency ID (RFID) tag attached to the device.