4.1 - 4.9 Flashcards
(162 cards)
is a document that lets the change administrators restore the network to the service level that was present before the change. Sometimes even the best plans can have unintended consequences on a network, or a planned upgrade might fail. When this happens, it is important to have an exact document that tells all the planned steps and logs the configuration codes necessary to get back to normal.
rollback/backout
is a document that lets the change administrators restore the network to the service level that was present before the change. Sometimes even the best plans can have unintended consequences on a network, or a planned upgrade might fail. When this happens, it is important to have an exact document that tells all the planned steps and logs the configuration codes necessary to get back to normal.
Rollback/ blackout plan
is used to evaluate a change in a safe and isolated environment that mirrors the production environment. It allows for the identification of potential issues and the validation of the change’s functionality and compatibility before deploying it to the production environment. It’s a proactive approach to catch problems before they impact the live system.
Sandbox testing
a crucial part of change management, but it outlines the steps to revert to the previous state in case of issues after implementation. It’s not primarily used to identify issues before implementation.
rollback/backout
One designated person generally coordinates changes with stakeholders throughout the organization. This person, called the change lead, can communicate planned changes to different departments so that they can check for possible impact or problems that could cause unintended consequences to other parts of the network or organization.
Responsible Staff Member
typically include terms and conditions that outline how the software or product can be used and what restrictions are placed on the end user. These restrictions may cover aspects like the number of installations, whether the software can be used for commercial purposes, limitations on modifying or reverse engineering the software, and more.
EULAs (End-User License Agreements)
When a Group Policy setting enforces the use of a specific SNTP (Simple Network Time Protocol) server, it can synchronize the ___ of the workstations. If there is a significant time difference between the workstations and the authentication server (e.g., domain controller), it can disrupt domain authentication.
SYSTEM CLOCK
To install a business application on a Windows 10 Enterprise 32-bit operating system, the technician should execute the file with the extension
.msi (Microsoft Installer).
In Ticketing System ,___-correct is important, of course, but so is gathering user information about where users work or how they are using the technology being supported. This information informs the support techncian on the nature of the problem.
Getting names
In Ticketing System ,Be specific about the device in question. Identifying a specific device or software that is not working will save valuable time if an onsite visit is necessary. The location, ID number, and name of a contact person all are helpful.
Device Information
In Ticketing System , Precise descriptions are essential. Saying that a device “is not working right” is not really helpful. “My network connection is uneven and drops every few minutes” does far more to isolate the problem and identify proper help.
Description of Problems
In Ticketing System , Provide a list of problem categories for users to choose from, with an Other option at the end. Most users are not aware of the categories or support specialties the support staff uses, so providing a list is helpful.
The following are examples of categories on a support ticket:
-User account support (password, login, and permissions support)
-Network/Internet access
-Slack or email
-Software support (listing names of supported software)
Categories
In Ticketing System , __helps the support team prioritize tickets so that the most critical
issues are supported first. Levels typically look similar to this listing,
including brief descriptions of the needed priority to help the client get the
proper support:
Urgent: Normal production work has stopped. This often impacts an entire office if an outage has occurred.
High: Some loss of capability to perform normal work tasks.
Average: Inconvenience to workers or customers, but the company is managing to get by at substandard levels.
Low: No impact on the ability to work, but maintenance could be required.
Severity
In Ticketing System , Depending on the size and scope of a support center, different levels (or tiers) of support are offered. Common problems that are fairly easy to resolve are assigned a low level; more complex problems that require special support skills and experience can be escalated to higher levels. The following are the three most common levels:
-Level 0: The customer/client can resolve the issue with online tools and documentation. An example is using a utility for password reset.
-Level 1: An agent has access to support software and support scripts (predefined steps to help users). An example is starting a script with “Is the machine plugged in and powered on?” and then moving to more technical details.
-Level 2 (or higher): Support staff employs specialized skills and usually more experience. Examples are software specialists and network specialists.
Escalation Levels
In Ticketing System , This involves getting examples and details on how the problem is manifesting itself to the user.
Problem description
In Ticketing System , Multiple people might be trying to resolve an issue, especially if a problem has been escalated. It is essential to make sure
everyone is working from the same information.
Progress notes
In Ticketing System , This is the hardest communication step. After working to resolve a problem and get the user back to work,
technicians often face pressure to move on to the next issue. However, complete documentation of the issue will help support staff recognize future issues with devices or identify areas where training is needed.
Problem resolution
contain a detailed history of all the hardware and software purchased for company use.
Inventory lists
A ____ tracks the assets in inventory. Depending on the size of the organization, this task can be managed with a small database, such as a simple spreadsheet, all the way to a specialized database, with staff assigned to track the assets for technical, budget, and tax purposes. The database should account for when assets were purchased, how and where they were used, and, eventually, how they were disposed of. The IT department usually must receive and document equipment with durable asset tags.
These tags are typically customized, including the name of the organization along with a barcode and serial number used to create an asset database. They are most often made of a metalized polyester that should last as long as the computer asset is expected to be in use. An asset tag allows the company to track who is assigned to the device and who is responsible for the equipment. This database is also used to track warranty information and repairs. Using a barcode scanner is the most convenient way to keep track of the equipment while it is in use in the company.
database system
The ————-describes a method for planning purchases and the expected life of technical assets bought for the company. This is generally done for larger purchases, such as servers, switches, and major software implementations, but not so much for consumables, such as cables and keyboards. The lifecycle can vary widely, depending on the asset.
procurement lifecycle
An ___ as it pertains to user safety and security procedures, is designed to keep a network safe from outside intruders. Acceptable use goes even further when it comes to computer best practices within a company. Each organization should define what it considers to be acceptable use of its computing resources within its network
acceptable use policy (AUP),
For example,
government networks generally are not available for private use, so private email might not be allowed on work computers. Inappropriate use of the
Web has been a problem in workplaces since the Internet became common in business.
acceptable use policy (AUP),
A __ is essentially a
map of a network that shows how equipment is physically arranged in the
building and logically connected as a network.
network topology diagram i