Operational Procedures Flashcards

(67 cards)

1
Q

Define Standard Operating Procedures (SOP):

A

Set of instructions that outline how to perform a specific task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an Service-level Agreement?

A

SLA is a contract between a service provider and a customer. E.g. service levels, performance metrics, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are incident reports?

A

Document used to record unexpected events and accidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are workflows?

A

List of steps that must be done to achieve a goal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are CMDB?

A

Configuration Management Databases, used for advanced asset management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What should we have whenever we want to implement change in a system?

A

Backup plan/rollback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is included in a change management form?

A
  • Responsible staff members
  • Purpose of the change
  • Scope of the change
  • Change type
  • Date and time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a standard change?

A

Low-risk change that’s preapproved and follows documented repeatable tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a normal change?

A

An intermediary-risk change that is not urgent or pre-approved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a emergency change?

A

Urgent change that may present high risks if not addressed promptly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are change freezes?

A

Periods of the year where change is not allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define RTO:

A

Recovery Time Objective. Maximum tolerable length of time that system can be down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define RPO:

A

Recovery Point Objective. Maximum acceptable amount of data loss measured in time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a full backup?

A

Backup everything!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are incremental backups?

A

An initial full backup and then second backup contains only the changes since last backup and third and fourth…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are differential backup?

A

Full backup initially. Next backups contain all data changes since last FULL backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are synthetic backups?

A

Create a full backup and then create incremental backups which are merged with the full backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the two restore options?

A
  • Restore in-place (overwrite current system)
  • Restore on an alternative location
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the 3-2-1 backup rule?

A

There should be THREE copies of data
- Original and at least 2 backup copies
TWO different media types
- Hard drives and cloud storage
ONE copy must be offsite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the Grandfather-Father-Son (GFS) backup strategy?

A

Grandfathers
Full monthly backups
Fathers
Fuller weekly backups
Sons
Daily incremental / differential backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Where should electronic components be stored?

A

Regulated environments (10-27C / 50-80F). Avoid humidity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What fire extinguisher should you use for fires in IT?

A

Class C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the Material Safety Data Sheet (MSDS)?

A

Document that lists health and safety information for substances inside a product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does high humidity promote in IT equipment?

A

Condensation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What does low humidity promote in IT equipment?
Static discharges
26
What is the standard humidity for IT equipment?
45-55%
27
What are surge suppressors/protectors?
Devices that absorb power spikes and filters noise
28
What is chain of custody?
Record everyone who has touched a piece of evidence
29
What should be included in an incident report?
How the issue was identified and information of the incident
30
What is order of voltality?
How long does a piece of data stick around before it disappears.
31
What is a perpetual license model?
Pay once and you can use this version of the software. You own the software
32
What types of licensing are there?
- Per seat - Per concurrent user - Per server - Per server - A mix of all of the above
33
What is open-source software?
Software that is available for free, and the creators published the source code.
34
What are some examples of regulated data?
- Credit card information - Patient information - Social security numbers - Passport numbers
35
What is GDPR?
Protects the security and privacy of data
36
What is HIPAA?
IT standard for healthcare, and how health data is manged/secured
37
What is the The National Institute of Standards and Technology (NIST)?
Compliance for working with American state and data regarding them
38
What is PCI-DSS standard?
Payment of financial standard on how to handle financial information
39
What is Acceptable Use Policy (AUP)?
Set of rules and guidelines that define how employees use company resources
40
What is a splash screen?
Displays information to uses e.g. when they log in
41
What are the scripting types?
- PowerShell - Batch - VBScript - Shell Script - JavaScript - Python
42
What is the PowerShell file type?
.ps1
43
What is the batch file type?
.bat
44
What is the VBSScript file type?
.vbs
45
What is the Shell script file type?
.sh
46
What is the JavaScript file type?
.js
47
What are scripting use cases?
- Installation of applications - Backups - Gathering information/reporting - Mapping of network drives - Initiating updates - Restarting machines
48
What are batch scripts useful for?
Automating command-line tasks using simple commands
49
What is powershell used for?
Manging windows environments.
50
What is VBScripts used for?
Visual Basic scripts for Windows automation and web scripting
51
What are Shell scripts used for?
Executing/automating commands in Linux/Unix environments.
52
What is JavaScript used for?
Runs scripts for web pages, servers, or automation with many frameworks
53
What is Python used for?
Scripts execute versatile programming tasks, from automation to web development
54
What are the dangers of using scripts you don't understand?
- Change system settings by accident - Unintentionally introduce malware - Crash systems due to mishandling of resources
55
What is a remote desktop connection?
Connect to another desktop/server and have full control
56
What is Virtual Network Computing (VNC)?
- Cross platform remote desktop connections - Uses Remote Frame Buffer protocol
57
What is SSH used for?
Linux systems
58
What is Remote Monitoring and Management (RMM)?
Tools and software used to remotely monitor and troubleshoot devices
59
What is Simple Protocol for Independent Computing Environments (SPICE)?
Remote display protocol designed for Virtual Desktop infrastructure solutions. Alternative for RDP for Linux-based environments
60
What is Windows Remote Management (WinRM)?
Enables admins to remotely manage Windows devices using command-line tools.
61
What are security risks for RDP?
- Brute Force Attacks - Exposed RP ports - Weak authentication can lead to data leaks
62
What is the security risk of Virtual Network Computing (NVC)?
Lack of built-in encryption in many versions. Man-in-middle attacks
63
What is a best practice for Remote desktop protocols/connections?
- Change default port - Use VPNs or firewalls - Strong passwords - If it's not needed don't enable it
64
When should you use SPICE?
ONLY in trusted networks
65
What are the security risks of Windows Remote Management (WinRM)?
Can be exploited if exposed to internet
66
What are AI hallucinations?
False or misleading information that appears plausible but is not based on real data
67
What is AI Bias?
Systematic errors caused by imbalanced or prejudiced training data.