Operational Procedures

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which symbol in a Bash scripts indicates the rest of the line is a comment?

# is the comment symbol in bash.

What is the extension of a Visual Basic file?

.vbs

Windows RDP uses which port?

3389

GLBA (Gramm-Leach-Bliley Act)

A U.S. law that requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.

line-interactive UPS

A UPS in which a pair of inverters and converters draw power from the outside source both to charge the battery and provide power to the internal protected device.

uniterruptible power supply (UPS)

A battery power source that provides electric current during a power outage.

FERPA (Family Educational Rights and Privacy Act)

A federal law that regulates the management of student records and disclosure of information from those records. The Act has its own administrative enforcement mechanism.

Sarbanes-Oxley Act (SOX)

A law passed by Congress that requires the CEO and CFO to certify that their firm's financial statements are accurate.

Password policy

A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. A password policy is often part of an organization's official regulations and may be taught as part of security awareness training.

Online UPS

A power supply that uses the AC power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.

incremental backup (partial backup)

A type of backup that only backs up files that have changed since the last time files were backed up.

A customer calls the help desk to report an issue. The customer suggests that the problem is hardware related, but the technician knows from the description that this is not the case. Which of the following is the BEST course of action for the technician?

Acknowledge the customer's input, but follow another course of action.

Which is not a common device that can be recycled?

Alkaline batteries

Image-based backup

Allow for a complete server to be backed up called bare metal backup if the server were to fail you would restore the backup to a new server and restore it completely

Volume Shadow Copy

Allows Windows to backup entire volumes. Previous versions are created a minimum of once per day.

A technician troubleshooting a computer finds a faulty video card and needs to replace it. Which of the following safety procedures is the BEST to prevent damaging the new part?

Always use an anti-static mat.

Assets tag

An asset tag is a silver metallic tag (or yellow vinyl replacement label) that is permanently affixed to equipment that serves to identify it for tracking, inventory, and accountability purposes.

Indictment documentation

Anything unusual or outside of the normal processes Date and time Summary what happened Root cause ultimate reason the incident occurred Actions taken actions transistors during the incident to rectify the situation Remediation ultimate fix that will repair the root cause of the incident Services impacted details all the network systems and business units that were impacted during the incident

You are on-site. While working on the client's PC, you notice a red folder with the words "Classified, do not look" on the cover. What should you do?

Ask the client to remove the folder and then work on the PC. Not only must you be honest and trustworthy when working for a client, you must also be above suspicion.

Dana, a Tier 2 help desk tech at Highland Gadgets, Corp., gets that dreaded call, an already-frustrated customer with a dead PC. After walking the customer through a few standard troubleshooting routines, the customer tells Dana that she's wasting his time. He's already tried everything she's suggested so far. What should Dana do next?

Ask the customer open-ended questions to get closer to the underlying issue behind the PC that won't boot.

Change board

Body of users that will ultimately evaluate and then approve or deny the change you propose

Which is not an interpreted language?

C

Knowledge base articles

Collections of problems with solutions that both your internal customers and and end users can use to solve common problem Title symptom Introduction thesis of the problem as well as the systems affected Symptom explains how to identify the symptoms of the problem to assist the user in validating that the problem covered in the introduction is the problem they are having Solution steps to fix the issue More information resources they used to reach the solution Date allows the reader to see if it's an old or new problem Author person reading the article to contact the original technician that created the knowledge base article

Which type of conditions promote ESD?

Cool, dry air

Critical applications

Critical applications are being pushed to the cloud

recover point objective (RPO)

Defines how fast you can restore the data

Barcode

Defines the numeric number that identifies the assets

Documented business process

Defines who interact with the business process, how they interact with the process why the interact and when

Rollback plan

Describes the steps to roll back from a field primary plan if it were determined that the primary plan could not be completed you either and put me in an alternate plan or Robert Plant depending on the changes proposed in the change management plan document

Scope of change

Details how many systems the proposed changes will affect the scope could involve only one system or it could be all the systems in the entire enterprise it also can include how many people oppose changed will affect

Plan for change

Details how the proposed change will be executed step should be detailed on how the changes in the order of the changes

An incident response technician responds to a request for investigation about illegally obtained movies. The technician finds that a user has been violating company policy and illegally downloading movies. Which of the following would be the next BEST step for this technician to perform?

Document the incident, purge all policy violating materials.

Acceptable use policy

Internal policy used to protect an organizations resource from employee abuse

Finish diagram

Much more refined and would be mostly likely your final documentation at the end of a project , problem, implementation of a network system

Scratch diagram

Not a formal documentation primarily used to gain understand a problem and learn how something works and why

standyby ups

Operates by transferring the load from the ac line to the battery supplies inverter

compliance

Overall execution of policies processes when driven by regulations

Angel is new to the job and is making lists of data his company uses that gets regulated by corporate interests and by government regulations. Which of the following is considered government-regulated data?

PHI

Purpose of change

Reason the change management process starts

When working on a user's computer, Jamie the tech notices that the user has created a bunch of desktop shortcuts to inappropriate Web sites. What should Jamie do?

Report through proper channels

Which of the following tools and test equipment is routinely magnetized and should be used with caution around magnetic media?

Screwdrivers are sometimes magnetized to make it easier to keep the screw on the end of the screwdriver.

Change management

Standardize the methods and procedures used to handle changes in the company

Wearing an anti-static wrist strap while installing a CPU protects ________ from ESD.

The CPU

Risk analysis

The process of analyzing the proposed changes for the possibility of failure or undesirable consequences

copy backup

Type of backup similar to Normal or Full, in that all selected files on a system are backed up. This type of backup does not change the archive bit of the files being backed up.

Physical diagram

Useful for creating precise documentation and define a networks physical connections details why a network works by detailing exactly how the information will flow

Logical diagram

Useful for diagnostic purposes and for creating high level documentation they allow you to see how a network works and represent the logical flow of information

An LCD flat panel suddenly starts smoking badly. What should you do after unplugging the monitor?

Ventilate the room

You are a technician and you receive a call from a local business that reports that their server is rebooting at random times. After looking over their equipment you notice that the server is plugged into a surge supressor which is then plugged into the nearest wall outlet. After further inspection, you notice that there is also WiFi equipment, a portable humidifier, and a small window mounted air conditioner in the room. The server logs show no errors causing the reboots. What is MOST likely causing these random reboots?

When the air conditioner and humidifier run simultaneously they cause a power drop.

HIPPA (Health Insurance Portability and Accountability Act)

a federal law that sets standards for protecting the privacy of patients' health information

full backup

exact copy of an entire database

differential backup

is a type of data backup that preserves data, saving only the difference in the data since the last full backup.


संबंधित स्टडी सेट्स

Infectious disease and immunization chap 23

View Set

Chapter 3: Structure and Function of the Reproductive System

View Set

WWII US History Test Study Guide

View Set

Chapter 10 Problem Set (Solutions)

View Set

CH 2 TCQ "A Chemical View of Life"

View Set