FLASH CARDS

9.01 Implement best practices with documentation and support systems information management

  • What is a policy in IT documentation?

  • A policy is a broad statement that outlines the organization's goals and expectations for using IT resources.

  • What is a Standard Operating Procedure (SOP)?

  • An SOP is a step-by-step list of actions required to complete a specific task in compliance with the organization's policies.

  • What are guidelines in IT management?

  • Guidelines provide advice in situations that haven’t been fully assessed or are too complex for an SOP and may explain when it’s appropriate to deviate from procedures.

  • What are common uses of SOPs in IT?

  • (a) Custom software installation, (b) New-user setup, and (c) End-user termination

  • What steps are involved in custom software installation SOPs?

  • (a) Verifying system requirements, (b) Validating the installation source, (c) Confirming license validity, (d) Adding software to change control, and (e) Developing support/training documentation

  • What is included in a new-user setup SOP?

  • (a) Enrollment with secure credentials, (b) Device allocation, (d) Permission allocation, and (e) Assignment to security groups

  • What is included in an end-user termination SOP?

  • (a) Returning and sanitizing devices, (b) Releasing software licenses, and (c) Disabling account permissions

  • What is a ticketing system used for?

  • A ticketing system manages and tracks support requests, incidents, and problems.

  • What are the steps in the ticket management process?

  • (a) User contact, (b) Ticket creation, (c) Information capture, (d) Categorization and urgency assessment, and (e) Initial troubleshooting

  • What basic ticket types are there in a support system?

  • (a) Requests: For tasks with standard procedures, (b) Incidents: Errors or unexpected issues, and (c) Problems: Underlying causes of incidents

  • What are simplified categories for end-users in a ticketing system?

  • (a) New Device Request, (b) New App Request, (c) Employee Onboarding, (d) Employee Offboarding, (e) Help/Support, and (f) Security Incident

  • What are the severity levels for tickets?

  • (a) Critical: Widespread effects or data breaches, (b) Major: Affects a limited group or suspected security issue, and (c) Minor: Minimal impact on operations

  • What is escalation in ticket management?

  • Escalation occurs when an agent cannot resolve the issue and the ticket is passed to senior technicians or other departments for resolution.

  • What are the tier levels in support teams?

  • (a) Tier 0: Self-service options, (b) Tier 1: Agent for initial diagnosis, (c) Tier 2: Senior technicians or third-party support, and (d) Tier 3: Development or engineering teams

  • Why is clear written communication important in ticketing?

  • It ensures that others can understand the issue and the steps taken so far, helping streamline the troubleshooting process.

  • What should be included in an incident report?

  • (a) Problem description, (b) Progress notes, and (c) Problem resolution

  • What is asset management in IT?

  • The process of tracking hardware and software resources to implement life-cycle procedures, such as provisioning, maintenance, and decommissioning.

  • What are tangible and intangible assets in IT?

  • (a) Tangible: Hardware, systems, and components, and (b) Intangible: Software licenses and intellectual property (IP)

  • How are assets tagged for tracking?

  • With barcodes or RFID tags that allow the asset to be scanned and tracked within a system.

  • What are network topology diagrams used for?

  • To show how assets are interconnected, both physically and logically, within a network.

  • What is the asset procurement life cycle?

  • (a) Change procedures, (b) Procurement, (c) Deployment, (d) Maintenance, and (e) Disposal

  • What is an Acceptable Use Policy (AUP)?

  • A set of rules that define how users are allowed to use specific IT resources or services.

  • What are common restrictions in an AUP?

  • (a) Prohibited activities: Illegal actions or misuse, (b) Unauthorized installations, and (c) Intrusion prevention

  • How do organizations enforce an AUP?

  • (a) Regulatory compliance, and (b) Login splash screens reminding users of policies

  • How does asset documentation help with troubleshooting?

  • It links assets to support documentation and ticket history, improving problem resolution and analysis.