Operational Procedures
Which symbol in a Bash scripts indicates the rest of the line is a comment?
# is the comment symbol in bash.
What is the extension of a Visual Basic file?
.vbs
Windows RDP uses which port?
3389
GLBA (Gramm-Leach-Bliley Act)
A U.S. law that requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.
line-interactive UPS
A UPS in which a pair of inverters and converters draw power from the outside source both to charge the battery and provide power to the internal protected device.
uniterruptible power supply (UPS)
A battery power source that provides electric current during a power outage.
FERPA (Family Educational Rights and Privacy Act)
A federal law that regulates the management of student records and disclosure of information from those records. The Act has its own administrative enforcement mechanism.
Sarbanes-Oxley Act (SOX)
A law passed by Congress that requires the CEO and CFO to certify that their firm's financial statements are accurate.
Password policy
A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. A password policy is often part of an organization's official regulations and may be taught as part of security awareness training.
Online UPS
A power supply that uses the AC power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.
incremental backup (partial backup)
A type of backup that only backs up files that have changed since the last time files were backed up.
A customer calls the help desk to report an issue. The customer suggests that the problem is hardware related, but the technician knows from the description that this is not the case. Which of the following is the BEST course of action for the technician?
Acknowledge the customer's input, but follow another course of action.
Which is not a common device that can be recycled?
Alkaline batteries
Image-based backup
Allow for a complete server to be backed up called bare metal backup if the server were to fail you would restore the backup to a new server and restore it completely
Volume Shadow Copy
Allows Windows to backup entire volumes. Previous versions are created a minimum of once per day.
A technician troubleshooting a computer finds a faulty video card and needs to replace it. Which of the following safety procedures is the BEST to prevent damaging the new part?
Always use an anti-static mat.
Assets tag
An asset tag is a silver metallic tag (or yellow vinyl replacement label) that is permanently affixed to equipment that serves to identify it for tracking, inventory, and accountability purposes.
Indictment documentation
Anything unusual or outside of the normal processes Date and time Summary what happened Root cause ultimate reason the incident occurred Actions taken actions transistors during the incident to rectify the situation Remediation ultimate fix that will repair the root cause of the incident Services impacted details all the network systems and business units that were impacted during the incident
You are on-site. While working on the client's PC, you notice a red folder with the words "Classified, do not look" on the cover. What should you do?
Ask the client to remove the folder and then work on the PC. Not only must you be honest and trustworthy when working for a client, you must also be above suspicion.
Dana, a Tier 2 help desk tech at Highland Gadgets, Corp., gets that dreaded call, an already-frustrated customer with a dead PC. After walking the customer through a few standard troubleshooting routines, the customer tells Dana that she's wasting his time. He's already tried everything she's suggested so far. What should Dana do next?
Ask the customer open-ended questions to get closer to the underlying issue behind the PC that won't boot.
Change board
Body of users that will ultimately evaluate and then approve or deny the change you propose
Which is not an interpreted language?
C
Knowledge base articles
Collections of problems with solutions that both your internal customers and and end users can use to solve common problem Title symptom Introduction thesis of the problem as well as the systems affected Symptom explains how to identify the symptoms of the problem to assist the user in validating that the problem covered in the introduction is the problem they are having Solution steps to fix the issue More information resources they used to reach the solution Date allows the reader to see if it's an old or new problem Author person reading the article to contact the original technician that created the knowledge base article
Which type of conditions promote ESD?
Cool, dry air
Critical applications
Critical applications are being pushed to the cloud
recover point objective (RPO)
Defines how fast you can restore the data
Barcode
Defines the numeric number that identifies the assets
Documented business process
Defines who interact with the business process, how they interact with the process why the interact and when
Rollback plan
Describes the steps to roll back from a field primary plan if it were determined that the primary plan could not be completed you either and put me in an alternate plan or Robert Plant depending on the changes proposed in the change management plan document
Scope of change
Details how many systems the proposed changes will affect the scope could involve only one system or it could be all the systems in the entire enterprise it also can include how many people oppose changed will affect
Plan for change
Details how the proposed change will be executed step should be detailed on how the changes in the order of the changes
An incident response technician responds to a request for investigation about illegally obtained movies. The technician finds that a user has been violating company policy and illegally downloading movies. Which of the following would be the next BEST step for this technician to perform?
Document the incident, purge all policy violating materials.
Acceptable use policy
Internal policy used to protect an organizations resource from employee abuse
Finish diagram
Much more refined and would be mostly likely your final documentation at the end of a project , problem, implementation of a network system
Scratch diagram
Not a formal documentation primarily used to gain understand a problem and learn how something works and why
standyby ups
Operates by transferring the load from the ac line to the battery supplies inverter
compliance
Overall execution of policies processes when driven by regulations
Angel is new to the job and is making lists of data his company uses that gets regulated by corporate interests and by government regulations. Which of the following is considered government-regulated data?
PHI
Purpose of change
Reason the change management process starts
When working on a user's computer, Jamie the tech notices that the user has created a bunch of desktop shortcuts to inappropriate Web sites. What should Jamie do?
Report through proper channels
Which of the following tools and test equipment is routinely magnetized and should be used with caution around magnetic media?
Screwdrivers are sometimes magnetized to make it easier to keep the screw on the end of the screwdriver.
Change management
Standardize the methods and procedures used to handle changes in the company
Wearing an anti-static wrist strap while installing a CPU protects ________ from ESD.
The CPU
Risk analysis
The process of analyzing the proposed changes for the possibility of failure or undesirable consequences
copy backup
Type of backup similar to Normal or Full, in that all selected files on a system are backed up. This type of backup does not change the archive bit of the files being backed up.
Physical diagram
Useful for creating precise documentation and define a networks physical connections details why a network works by detailing exactly how the information will flow
Logical diagram
Useful for diagnostic purposes and for creating high level documentation they allow you to see how a network works and represent the logical flow of information
An LCD flat panel suddenly starts smoking badly. What should you do after unplugging the monitor?
Ventilate the room
You are a technician and you receive a call from a local business that reports that their server is rebooting at random times. After looking over their equipment you notice that the server is plugged into a surge supressor which is then plugged into the nearest wall outlet. After further inspection, you notice that there is also WiFi equipment, a portable humidifier, and a small window mounted air conditioner in the room. The server logs show no errors causing the reboots. What is MOST likely causing these random reboots?
When the air conditioner and humidifier run simultaneously they cause a power drop.
HIPPA (Health Insurance Portability and Accountability Act)
a federal law that sets standards for protecting the privacy of patients' health information
full backup
exact copy of an entire database
differential backup
is a type of data backup that preserves data, saving only the difference in the data since the last full backup.