Chapter 9 Operational Procedures Flashcards
When a technician is called into a building to service a computer or a network of computers, one of the first tasks is to:
understand how the network is supposed to work
A topology diagram is essentially:
a map of a network that show how equipment is physically arranged in the building and logically connected as a network
A physical topology diagram uses:
representational icons to depict types of equipment such as laptops, PCs, servers, wireless access points, switches and routers
A physical topology diagram may also show:
how computers and printers are arranged and the physical cables that connect them together
A physical topology diagram also maps:
wireless access ports and wiring closets
A technician can use a physical topology diagram to:
find a device she has been called to service
see what other equipment, such as printers, security cameras, and switches, are in use and where to find them
A physical topology diagram may “zoom out” and give:
the general design of a building, including wiring closets on floors and the point-of-presence (PoP) for connectivity to the ISP
A logical topology diagram depicts:
a network’s design, including how computers are grouped together into local area networks (LANs)
A logical topology diagram may include a:
basic map of wiring closets and general areas of the building, but instead of computers, this diagram focuses on network IP addresses
A logical topology diagram is beneficial because:
troubleshooting Internet connectivity is a major part of the IT workday, and knowing which network devices should be on saves time in troubleshooting
A whitepaper focuses on:
a complex technical topic and tries to make it understandable to the average reader.
Companies often publish whitepapers on:
new technologies or products they are presenting to the public in order to influence decision makers
Knowledge bases may also consist of:
links to commonly accessed support forums where fellow IT professionals go to seek and give technical support
Documenting problems, or incidents helps in understanding:
how an incident came about and how a solution was found-as well as who may have had a role in the solution
Incident Documentation will be invaluable to:
technicians the next time an incident occurs
What is a necessary part of legal and safe electronics and technology work?
Compliance with local government regulations
Construction codes for electrical and ventilation design are:
subject to local rules
An acceptable use policy (AUP) is designed to:
keep a network safe from outside intruders
Each organization should define what it considers:
acceptable use of its computing resources within its network
For legal protection of the company, acceptable use rules need to be:
established and agreed to (usually with a signature) by users
Password policy is mostly managed by:
network administrators, who may require complex passwords that need to be changed regularly
It usually falls to the IT department to:
receive and document equipment with durable asset tags
Asset tags are usually:
customized, with each one including the name of the organization along with a barcode and serial number
Most often asset tags are made of:
a metalized polyester that should last as long as the computer asset is expected to be in use