1.3 - CompTIA Security+

0.0(0)
studied byStudied by 0 people
0.0(0)
linked notesView linked note
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Change approval process

A formal procedure for requesting, reviewing, and authorizing changes, including a change request, change scope, risks, implementation time, and a backout plan.

2
New cards

Ownership

Refers to the individual or entity responsible for making a change, who may own the process but does not perform the actual change work.

3
New cards

Stakeholders

Individuals impacted by a change who seek input on the change management process.

4
New cards

Impact analysis

A process used to determine the risks associated with making or not making a change.

5
New cards

Test results

Results from testing a potential change in a sandbox environment to assess its effects on corporate systems.

6
New cards

Backout plan

A contingency plan designed to restore a system to its previous state if a new deployment causes issues.

7
New cards

Maintenance window

A specified time period during which system updates or fixes can be performed.

8
New cards

Standard operating procedure

A set of step-by-step instructions for carrying out routine operations efficiently and consistently.

9
New cards

Technical implications

The implications of the change management process from the technician’s perspective.

10
New cards

Allow lists/deny lists

Lists used to control access by specifying which users or systems are permitted (allow list) or prohibited (deny list).

11
New cards

Restricted activities

Actions permitted within the change approval scope, documented and approved.

12
New cards

Downtime

Periods when systems are unavailable due to maintenance, updates, or other approved changes. For 24×7 environments, try to switch to a secondary system, upgrade the primary system, then switch back.

13
New cards

Service restart

The process of stopping or restarting a service or daemon.

14
New cards

Application restart

The process of closing an application and launching a new instance.

15
New cards

Legacy applications

Older applications that may not be compatible with modern systems and environments.

16
New cards

Dependencies

Requirements for technicians to install updates related to other systems or libraries.

17
New cards

Documentation

Written guidelines outlining changes, including their scope, dependencies, and backout plans.

18
New cards

Updating diagrams

Ensuring diagrams correspond to recent changes.

19
New cards

Updating policies/procedures

Reviewing and refining procedures to align with updated systems.

20
New cards

Version control

Tracking changes to a file or configuration over time, allowing for easy reversion to previous settings.