RG: Ch 9: Operational Procedures Flashcards

1
Q

Which of the following is written in Python?

A. .psi

B. .vbs

C. .sh

D. .pyc

A

D. .pyc

A .pyc file is one written in the Python language. Python runs on Windows, Mac OS X, and Linux/Unix. A .vbs file is a Visual Basic file. An SH file is a script programmed for Bash, a type of Unix shell. A .pyc file is a Python file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following should the IT professional do when dealing with customers?

A. Use appropriate professional titles, when applicable

B. Take personal calls

C. Use the customer’s equipment for personal messages

D. Talk to co-workers while interacting with customers

A

A. Use appropriate professional titles, when applicable

You should use appropriate professional titles, when applicable, and never take personal calls, use the customers equipment for personal messages, or talk to co-workers while interacting with customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is a number that can be written without a fractional component?

A. Integer

B. String

C. Variable

D. Loop

A

A. Integer

An integer (from the Latin integer meaning “whole”) is a number that can be written without a fractional component (1, 2, 3 but not 1.5, 1.6). A string is a series of characters. Variables are used to store information to be referenced and manipulated in a computer program. A loop is section of code that goes back to an earlier part of the script.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is the least important piece of information to record about each device for proper asset inventory?

A. Make

B. Model

C. Serial number

D. Operating system

A

D. Operating system

While the OS may be important, for warranty issues these other pieces are more important. The make, model, and serial number are all important.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following ensures an escape from changes that break something?

A. Backout plan

B. Phased deployment

C. Communication process

D. Request control

A

A. Backout plan

During implementation, incremental testing should occur, relying on a predetermined fallback strategy if necessary. A phased deployment is one in which parts of the network are done at a time. While the communication process is important, it is not what allows for an escape. Request control is a process where change request are managed and approved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is not a safe lifting technique to keep in mind?

A. Lift with your back, not your legs

B. Be careful to not twist when lifting

C. Keep objects as close to your body as possible

D. Where possible, push instead of pull

A

A. Lift with your back, not your legs

Lift with your legs, not your back. When you have to pick something up, bend at the knees, not at the waist. The other options are all safety recommendation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What class of fire extinguisher is used for paper fires?

A. A

B. B

C. C

D. D

A

A. A

A is for wood and paper fires, B is for flammable liquids, C is for electrical fires, and D is for metal fires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is the not part of the first response to an incident?

A. Shut down the affected system

B. Identify

C. Report though proper channels

D. Data/device preservation

A

A. Shut down the affected system

You never shut down the system until all volatile evidence has been collected. The other options are correct guidelines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following applies to EU-based organizations that collect or process the personal data of EU residents?

A. PHI

B. PHI

C. GDPR

D. PCI-DSS

A

C. GDPR

Beginning on May 25, 2018, the members of the EU began applying the General Data Protection Regulation (GDPR). The GDPR applies to EU-based organizations that collect or process the personal data of EU residents and to organizations outside the EU that monitor behavior or offer goods and services to EU residents. Personally identifiable information (PII) is data like an XSN number that is unique to the individual. Personal health information (PHI) is confidential medical record. Payment Card Industry/ Data Security Standards (PCI-DSS) is a standard for protecting credit card data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If you use differential backups every day except Monday when you do a full backup, how many backup tapes will be required if there is a drive failure on Wednesday after the backup has been made?

A. 4

B. 3

C. 2

D. 1

A

C. 2

Since a differential backup backs up everything that has changed since the last full backup, each day’s incremental tape contains what was on the previous day’s tape. So, you only need the last differential and the last full backups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Any type of chemical, equipment, or supply that has the potential to harm the environment or people has to have what document associated with it?

A. SOW

B. MSDS

C. SLA

D. MOU

A

B. MSDS

Any type of chemical, equipment, or supply that has the potential to harm the environment or people has to have a material safety data sheet (MSDS) associated with it. These are traditionally created by the manufacturer, and you can obtain them from the manufacturer or from the Environmental Protection Agency. A statement of work (SOW) is a document that indicates the work to be performed. A service level agreement is a document that indicates what is being paid and what the service consists of. A memorandum of understanding (MOU) is a document that indicates the intent of two parties to do something together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is false regarding dealing with customers?

A. Always answer the telephone in a professional manner, announcing the name of the company and yourself

B. Make a concentrated effort to ascertain the customer’s technical level, and communicate above it

C. Use proper language (avoid jargon, acronyms, and slang when applicable)

D. Maintain a positive attitude/project confidence

A

B. Make a concentrated effort to ascertain the customer’s technical level, and communicate above it

If you’re providing phone support, do the following:

Always answer the telephone in a professional manner, announcing the name of the company and yourself.

Make a concentrated effort to ascertain the customer’s technical level, and communicate at that level, not above or below it.

The other options are all valid recommendations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is false with respect to change management?

A. All changes should be formally requested.

B. Each request should be analyzed to ensure it supports all goals and polices.

C. After formal approval, all costs and effects of the methods of implementation should be reviewed.

D. After they’re approved, the change steps should be developed.

A

C. After formal approval, all costs and effects of the methods of implementation should be reviewed.

All costs and effects of the methods of implementation should be reviewed prior to formal approval. The other statements are true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the process called that ensures all configuration changes are beneficial?

A. Change management

B. Acceptable use

C. Separation of duties

D. Risk analysis

A

A. Change management

During the change management process, the relative costs and benefits to the overall organization will be weighed by a change management board or team. Acceptable use is a policy that defines what users can and cannot do. Separation of duties is a concept that says that any operation prone to fraud should be broken into two jobs and assigned to two people. Risk analysis is a process that identifies risk and mitigations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is a command-line tool?

A. RDP

B. Screen sharing

C. File sharing

D. SSH

A

D. SSH

If you don’t need access to the graphical interface and you just want to operate at the command line, you have two options, Telnet and SSH. While Telnet works just fine, it transmits all of the data in clear text, which obviously would be security issue. Remote Desktop and screen sharing are graphical concepts, while file sharing is not a command-line utility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If you use incremental backups every day except Monday, when you do a full backup, how many backup tapes will be required if there is a drive failure on Wednesday after the backup has been made?

A. 4

B. 3

C. 2

D. 1

A

D. 1

Since an incremental backup backs up everything that has changed since the last backup of any type, each day’s tape is unique, so you will need the Monday full backup and the incremental tapes from Tuesday and Wednesday.

17
Q

What humidity level should be maintained for computing equipment?

A. 50 percent

B. 40 percent

C. 60 percent

D. 30 percent

A

A. 50 percent

Another preventive measure you can take is to maintain the relative humidity at around 50 percent. Be careful not to increase the humidity too far—to the point where moisture starts to condense on the equipment!

18
Q

Which of the following is the least secure remote access technology?

A. RDP

B. Screen sharing

C. Telnet

D. SSH

A

C. Telnet

While Telnet works just fine, it transmits all of the data in clear text, which obviously would be a security issue. Remote Desktop and screen sharing are graphical concepts that’s can be secured, while Secure Shell (SSH) is an encrypted technology.