Section 4: Operational Procedures

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/117

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:58 PM on 3/14/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

118 Terms

1
New cards

Ticketing System

Used to manage requests incidents, and problems that are submitted by the users

2
New cards

Incident

An issue that happened one time or an isolated issue

3
New cards

Problem

An incident that happened multiple times across multiple users/devices

4
New cards

Request

Asking for something from the IT department

5
New cards

Incident

Related to any kind of error or unexpected issue that may arise by an end user when using a system

6
New cards

Asset Management

Systematic approach to the governance and realization of value of things over its life cycle

7
New cards

Change

Addition, modification, or removal that may have a direct or indirect effect on IT services

8
New cards

Standard Changes

Preauthorized and can be implemented without any additional authorization

9
New cards

Normal Changes

Changes where the authorization is gained

10
New cards

Change Schedule

Helps plan the changes and assists in communicating such changes to the stakeholders to avoid conflicts

11
New cards

Acceptable Use Policy (AUP)

A document stipulating constraints and practices that a user must agree to for access to a corporate network or the internet

12
New cards

Splash Screen

Shows up when someone tries to log into a computer

13
New cards

Standard Operating Procedure (SOP)

An inflexible, step-by-step listing of the actions that must be completed for a given task

14
New cards

End-user Termination Checklist and Procedures

Used as part of the employee offboarding process

15
New cards

Incident Report/After Action Report (AAR)

Gathers the opinions of all involved users, customers, technicians, managers, and stakeholders

16
New cards

Network Topology Diagrams

Show exactly how the network was designed

17
New cards

Service Level Agreement (SLA)

A formal contract that defines the level of service a provider must deliver

18
New cards

Internal SLAs

Agreements between departments or teams within the same organization

19
New cards

Full Backup

Creates a complete copy of all selected files, folders, hard drives, or applications in a single operation

20
New cards

Incremental Backup

Only back up things that have changed since the last backup

21
New cards

Differential Backup

Backs up all the data that has been changed since the last backup

22
New cards

Synthetic Backup

Creates a new full backup by merging the last full backup with subsequent incremental backups on the storage server

23
New cards

On-site

The backup storage mechanism is located in the same location as the system they’re backing up

24
New cards

Off-site

Backing up to some system not inside the same physical building where workstations are

25
New cards

Grandfather-Father-Son (GFS)

Tape media rotation scheme that allows some of your backup media to be taken to an offsite storage

26
New cards

3-2-1 Backup Rule

Requires three copies of data, including a production copy on servers, two different types of media, and one copy held offline and off-site

27
New cards

Redundant Power Supply

Enclosure that provides two or more complete power supplies inside of one

28
New cards

Surge

Unexpected increase in the amount of voltage that’s being provided

29
New cards

Spike

A short, transient voltage from a short circuit breaker, a power outage, or even a lighting strike

30
New cards

Sag

An unexpected decrease in the amount of voltage provided

31
New cards

Brownout

Occurs when a voltage drops to such an extent that it causes lights to dim and computers to shut off

32
New cards

Blackout

Occurs when there is a total loss of power for a long period of time

33
New cards

Uninterruptible Power Supply (UPS)

Combines the functionality of a surge suppressor with a battery backup

34
New cards

Backup Generator

An emergency power system used to provide power during an outage of the regular supply from the electric grid

35
New cards

Equipment Grounding

Ensures every electrical device has a path to the ground that provides the least amount of resistance for electrical current to flow away harmlessly

36
New cards

Proper Power Handling

Methods to keep technician safe when working on electrical equipment

37
New cards

Electrostatic Discharge (ESD)

Occurs whenever there’s a path that allows electrons to rush from a statically charged body to a component that has no charge

38
New cards

Material Safety Data Sheet

Contains all the information about the ingredients, health hazards, precautions, and first aid information

39
New cards

AI Policies

Provide formal guidelines for the design, deployment, and use of AI systems

40
New cards

Accountability

Organizations must clearly define who is responsible for the decisions made by AI systems and their outcomes

41
New cards

Bias

AI systems can inadvertently produce biased results due to flaws in training data or algorithm design

42
New cards

Data Privacy

Ensure that this data is collected, stored, and processed responsibly/privately

43
New cards

Transparency

Organizations must ensure that users and stakeholders understand how AI systems function and make decisions

44
New cards

Appropriate Use

Ensures that AI systems are used ethically and align with an organization’s values

45
New cards

Plagiarism

Ensure that AI-generated material respects intellectual property rights and maintains originality

46
New cards

Bias

Can originate from the datasets used to train AI models and it reflects the prejudices or gaps inherent in the data

47
New cards

Hallucination

Occurs when an AI system produces outputs that are entirely fabricated or inaccurate while presenting them as factual

48
New cards

Accuracy

While AI can process vast amounts of data and identify patterns more quickly than humans, it is not always accurate

49
New cards

Public AI

Refers to models and platforms made available to the general public

50
New cards

Private AI

Artificial intelligence use customized for specific organizations and operates within controlled environments

51
New cards

Incident Response

A set of procedures an investigator follows when examining a computer security incident

52
New cards

Identification

Process of recognizing if an event should be classified as an incident or not

53
New cards

Containment

Focused on isolating the incident or problem

54
New cards

Eradicate

To remove the threat or attack

55
New cards

Recovery

Focused on data restoration, system repair, and re-enabling any servers or networks

56
New cards

Lesson Learned

A process used to document the incident response process and make any changes to the procedures and the processes

57
New cards

Chain of Custody

The record of evidence history from collection to court presentation and disposal

58
New cards

Faraday Bag

Shields devices from outside signals to prevent data from being altered, deleted, or added to a new device

59
New cards

Legal Hold

Preserves all relevant information when litigation is reasonably expected to occur

60
New cards

Data Acquisition

Creates a forensically sound copy of the data from a source device

61
New cards

Order of Volatility

Collecting evidence that could be easily tampered or destroyed first

62
New cards

Personal License

Allows one individual user to use a piece of software on their given machine

63
New cards

Corporate License

A license for each individual machine or person who is actively using the license

64
New cards

Active Users

People who are actually logged in at this moment using that piece of software

65
New cards

Licenses

Provide the legal access to use a software, and also the privilege of getting all the updates and security patches

66
New cards

End User License Agreement

Dictates the terms of the license for a software

67
New cards

Digital Rights Management

Ensures copy protection for music and video that is being used in an online or digital manner

68
New cards

Data Classification

Based on its value to the organization and the sensitivity of the information if it were to be disclosed

69
New cards

Public Data

No impact to the company if released and is often on a company’s website

70
New cards

Sensitive Data

Minimal impact if released and includes things like a company’s finances

71
New cards

Confidential Data

Contains items such as trade secrets, intellectual property data, source code, and things that would harm the company if disclosed

72
New cards

Unclassified

Can be released to the public under the Freedom of Information Act

73
New cards

Controlled Unclassified Information (CUI)

Includes unclassified information that should be protected from public disclosure

74
New cards

Secret Data

Includes data such as military deployment plans and other things that would damage national security if disclosed

75
New cards

Top Secret Data

Includes blueprints for weapons or other information that could gravely damage national security if known by those unauthorized to know

76
New cards

Data Retention

Maintains and controls certain data to comply with business policies and applicable laws and regulations

77
New cards

Data Preservation

Keeping information for a specific purpose outside of an organization’s data retention policy

78
New cards

Recovery Point Objective (RPO)

Maximum amount of time that can be lost from a recovery after a disaster, failure, or other event

79
New cards

Data Type

A tag or a label to identify a piece of data under a subcategory of a classification

80
New cards

Health Data

Health Insurance Portability and Accountability Act

81
New cards

Financial Data

Consists of pieces or sets of information related to the financial health of business

82
New cards

Payment Card Industry/Data Security Standard (PCI/DSS)

An agreement that any organization that collects, stores, or processes credit card customer information must abide by

83
New cards

Intellectual Property

A type of data that includes intangible creations of human intellect

84
New cards

Personally Identifiable Information (PII)

Data used to identify, contact, or locate an individual. Information such as SSN, name, date of birth, email address, etc.

85
New cards

Data Format

This is the organization of the information into preset structures or specifications

86
New cards

Non-Disclosure Agreement (NDA)

Defines what data is confidential and cannot be shared outside of a relationship

87
New cards

Memorandum of Understanding (MOU)

Non-binding agreement between two or more organizations to detail what common actions they intend to take

88
New cards

Service-Level Agreement (SLA)

Documents the quality, availability, and responsibilities agreed upon by a service provider and a client

89
New cards

Shell Script

Text-based file that contains commands that can be interpreted and presented to the computer

90
New cards

Batch File (.bat)

Text-based file containing Windows commands and is interpreted from the command line environment

91
New cards

PowerShell (.ps1)

Allows for more complex scripts

92
New cards

Visual Basic Script (.vbs)

Scripting language based on the Visual Basic programming language

93
New cards

Linux Shell Script (.sh)

Works a lot like a batch script inside of Windows

94
New cards

JavaScript File (.js)

Scripting language designed to be implemented inside of a web-based interface

95
New cards

Python (.py)

General-purpose scripting and programming language that is used to develop automation scripts and full-fledged software applications

96
New cards

Network Drive Remapping

Done with normal command line interface using a batch file (.bat) or PowerShell

97
New cards

Telnet (23)

Sends text-based commands to remote devices and is a very old networking protocol

98
New cards

Secure Shell (SSH) (22)

Encrypts everything that is being sent and received between the client and the server

99
New cards

Remote Desktop Protocol (RDP) (3389)

Provides graphical interface to connect to another computer over a network connection

100
New cards

Remote Desktop Gateway (RDG)

Provides a secure connection using the SSL/TLS protocols to the server via RDP

Explore top notes

note
IGCSE: Human nutrition
Updated 465d ago
0.0(0)
note
CAVITE MUTINY
Updated 515d ago
0.0(0)
note
Human Anatomy Lecture 1:
Updated 1277d ago
0.0(0)
note
Bill of Rights
Updated 919d ago
0.0(0)
note
Homeostasis and Response
Updated 557d ago
0.0(0)
note
Developing Complex Arguments (AP)
Updated 344d ago
0.0(0)
note
Carboxylic Acids
Updated 1157d ago
0.0(0)
note
IGCSE: Human nutrition
Updated 465d ago
0.0(0)
note
CAVITE MUTINY
Updated 515d ago
0.0(0)
note
Human Anatomy Lecture 1:
Updated 1277d ago
0.0(0)
note
Bill of Rights
Updated 919d ago
0.0(0)
note
Homeostasis and Response
Updated 557d ago
0.0(0)
note
Developing Complex Arguments (AP)
Updated 344d ago
0.0(0)
note
Carboxylic Acids
Updated 1157d ago
0.0(0)

Explore top flashcards

flashcards
Unit 7 Terms (PART 2)
81
Updated 753d ago
0.0(0)
flashcards
response to industry
59
Updated 701d ago
0.0(0)
flashcards
¿Adónde fuiste?
34
Updated 767d ago
0.0(0)
flashcards
clinical ospe
86
Updated 671d ago
0.0(0)
flashcards
Science exam
167
Updated 993d ago
0.0(0)
flashcards
Pharmacology Exam 1
214
Updated 543d ago
0.0(0)
flashcards
Unit 7 Terms (PART 2)
81
Updated 753d ago
0.0(0)
flashcards
response to industry
59
Updated 701d ago
0.0(0)
flashcards
¿Adónde fuiste?
34
Updated 767d ago
0.0(0)
flashcards
clinical ospe
86
Updated 671d ago
0.0(0)
flashcards
Science exam
167
Updated 993d ago
0.0(0)
flashcards
Pharmacology Exam 1
214
Updated 543d ago
0.0(0)