Uploaded by Danielle Raynor

Chapter 09 PPT

advertisement
A+ Certification Guide
Chapter 9
Operational Procedures
Chapter 9 Objectives
 Core 2 (220-1102): Objective 4.1: Given a
scenario, implement best practices associated
with documentation and support systems
information management.
 Core 2 (220-1102): Objective 4.2: Explain
basic change-management best practices.
 Core 2 (220-1102): Objective 4.3: Given a
scenario, implement workstation backup and
recovery methods.
Chapter 9 Objectives, Continued
 Core 2 (220-1102): Objective 4.4: Given a
scenario, use common safety procedures.
 Core 2 (220-1102): Objective 4.5: Summarize
environmental impacts and local environmental
controls.
 Core 2 (220-1102): Objective 4.6: Explain the
importance of prohibited content/activity,
privacy, licensing, and policy concepts.
Chapter 9 Objectives, Continued
 Core 2 (220-1102): Objective 4.7: Given a
scenario, use proper communication techniques
and professionalism.
 Core 2 (220-1102): Objective 4.8: Identify the
basics of scripting.
 Core 2 (220-1102): Objective 4.9: Given a
scenario, use remote access technologies.
Ticketing Systems






User information
Device information
Description of problems
Categories
Severity
Escalation levels
o
0, 1, 2
 Clear, concise, written communication
Asset Management






Inventory lists
Database systems
Procurement lifecycle documentation
Warranty and licensing
Licensing agreements
Asset tags
Documentation Types
 Acceptable use policy (AUP)
 Network topology diagrams
Physical
o Logical
o
 Regulatory and compliance policy
Splash screens
o Incident reports
o Standard operating procedures (SOP)
o
 Knowledge base and articles (white papers)
Change Management








Documented business processes and practices
Rollback plan (backout plan)
Sandbox testing
Responsible staff member
Request forms
Purpose of change
Scope of change
Date and time of change
Change Management, Continued




Affected systems/impact
Risk analysis
Change board approvals
End User Acceptance
Backup and Recovery
 Types of backups
System image
(snapshot)
o File-level backup
o
•
•
•
•
o
Full
Incremental
Differential
Synthetic
Critical application
backup
 Backup testing
 Account recovery
options
 Backup rotation
schemes
Grandfather-fatherson (GFS)
o 3-2-1 backup rule
o
 Onsite/offsite backup
Comparing Cloud vs. Local Storage
Equipment Grounding
 Grounded outlets
 Grounded to ungrounded adapter
 Outlet testers
Avoiding Electrostatic Discharge
(ESD)
 Use ESD-preventive equipment
Antistatic bags
o ESD straps
o ESD mats
o
 Self-ground by touching metal frames before
touching chips or circuit boards
 Don’t shuffle your feet; don’t move more than
necessary when working with electronics
 Work in a non-carpeted area
 Low humidity makes ESD more likely
Personal Safety







Disconnect the power first
Remove jewelry
Use safe lifting techniques
Know your weight-lifting limitations
Have Class C fire extinguishers available
Manage cables to prevent trip-and-fall
Wear safety equipment
o
Goggles, air filter mask
 Comply with government regulations
Environmental Impacts and Controls
 Material Safety Data Sheets (MSDS)
 Temperature
Electronics work best in cooler environments, but
above freezing
o Recommended range is 68 to 76 F
o
 Humidity
ESD occurs more frequently at lower humidity
o Recommended humidity range is 20% to 60%
o
 Ventilation and air quality
Toxic Waste Handling





Batteries
Toner
CRT displays
Cell phones
Tablets
UPSs and Surge Protectors
 Uninterruptible power supply (UPS)
Protects against power outages and sags
o Protects against power surges and spikes
o Two types
o
• True UPS
• Standby power supply (SPS) or line-interactive unit
 Surge protector
o
Protects against power surges and spikes
Addressing Prohibited Content or
Activity
 Incident response
 First response
Report through proper channels
o Data/device preservation
o
 Documentation
 Chain of custody
Software Licensing
 Limitations created by digital rights
management (DRM)
 End-user license agreements (EULA)
 Open source vs. commercial licenses
 Personal vs. enterprise licenses
Per seat
o Per user
o
Regulated Data
 Personally identifiable information (PII)
o
Name, address, credit card numbers, SSN
 Payment Card Industry (PCI) standards
o
Protects credit card holder data and credit information
 General Data Protection Regulation (GDPR)
o
European regulation to protect health, biometrics,
genetic, and criminal history data
 Protected health information (PHI)
o
Health status, diagnoses, payment methods, account
numbers, and beneficiaries
Professionalism
 Wear proper attire
 Actively listen to the
customer and take
o Formal
notes
o Business casual
 Use proper language  Do not interrupt
o Avoid jargon,
 Be culturally sensitive
acronyms, and slang
 Be punctual
 Maintain a positive
 Avoid distractions
attitude/project
confidence
Dealing with Difficult Customers





Avoid arguing or getting defensive
Do not minimize or dismiss problems
Avoid being judgmental
Clarify customer statements
Do not disclose experiences on social media
Dealing with Difficult Customers






Avoid arguing with the customer
Don’t be defensive
Do not minimize the customer’s problems
Avoid being judgmental
Clarify customer statements
Don’t disclose experiences on social media
Customer Service
 Set and meet expectations/timeline
 Communicate status with the customer
 Deal appropriately with customers’ confidential
and private materials
Script Types
Script Types, Continued
Use Cases for Scripting
Remote Access Technologies
 Remote desktop
protocol (RDP)
 Virtual private
networking (VPN)
 Virtual network
computing (VNC)
 Secure Shell (SSH)
 Remote monitoring
and management
(RMM)
 Microsoft Remote
Assistance (MSRA)
 Third-party tools
 Screen sharing and
videoconferencing
software
 File transfer software
 Desktop management
software
In This Chapter, You Learned About…
Best practices associated with types of documentation
Basic change management best practices
Basic disaster prevention and recovery methods
Common safety procedures
Environmental impacts and appropriate controls
Processes for addressing prohibited content/activity, and
privacy, licensing, and policy concepts
 Proper communication techniques and professionalism
 Basics of scripting
 Remote access technologies






Download