Implement Best Practice Documentation Flashcards

lesson 20A (30 cards)

1
Q
A

Defining help-desk categories in the osTicket ticketing system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A

Lansweeper inventory management software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A Standard Operating Procedure (SOP)

A

is a detailed, step-by-step instruction set designed to ensure tasks are performed consistently and in alignment with organizational policy, helping employees work securely, efficiently, and with accountability—especially in areas like software installation, user onboarding, and offboarding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ticketing systems

A

streamline IT support by creating and tracking unique support cases—each ticket includes user and device details, issue descriptions, urgency assessments, and potential troubleshooting steps, with escalation protocols if initial efforts don’t resolve the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ticket categories

A

—like Requests, Incidents, and Problems—help organize support issues for efficient handling and reporting, though simplified user-facing options (e.g., “Help” or “New Device”) and flexible keyword tagging can improve usability and technician workflow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CRM (Customer Relationship Management)

A

is a centralized system that manages all interactions between a company and its customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asset ID

A

is a unique identifier, often a string of characters, assigned to a specific asset for tracking and management purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ticket categories

A

help organize and route support requests efficiently by classifying them as Requests, Incidents, or Problems, but for end-user clarity, systems often use simplified labels (like Help or Onboarding) and may supplement with technician-assigned subcategories or keyword tags to improve tracking and reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Severity levels classify

A

support tickets by impact, typically as critical, major, or minor, to prioritize responses and escalate issues appropriately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Effective ticket management relies

A

on clearly tracking ownership and status throughout the troubleshooting process, using consistent documentation and escalation paths to ensure timely resolution and accountability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Escalation levels define how unresolved tickets move through support tiers

A

—from self-service (Tier 0) to frontline agents (Tier 1), then senior/internal or external experts (Tier 2), and finally engineering or leadership (Tier 3)—with ownership tracked at every stage to ensure progress and clear communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Clear written communication in ticketing systems ensures

A

that all stages—problem description, progress notes, and problem resolution—are accurately documented using plain, concise language, enabling effective troubleshooting, collaboration, and transparency throughout the ticket’s lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Incident reports—also known as after-action reports or lessons learned—are

A

detailed reviews of major or critical incidents that gather input from all stakeholders to uncover root causes and propose solutions or preventive measures to reduce the likelihood of recurrence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Effective asset identification and inventory management ensures

A

organizations maintain a comprehensive catalog of both tangible assets (like deployed and backup hardware) and intangible assets (such as software licenses and intellectual property), supporting consistent provisioning, upkeep, and decommissioning throughout the IT service lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An asset-management database system centralizes

A

information like hardware specs, asset IDs, locations, assigned users, and service history. Tools like Lansweeper enhance this by scanning networks to automatically gather and update inventory data, streamlining both asset visibility and lifecycle tracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Asset tags—like

A

barcodes and RFID stickers—provide unique IDs for each asset, enabling easy identification, tracking, and real-time location updates within inventory systems, which enhances asset management and helps deter theft.

17
Q

Network topology diagrams visually represent how

A

networked assets connect—both physically (e.g., cabling, switches, patch panels) and logically (e.g., VLANs, security zones, IP subnets). These diagrams can be manually created with tools like Microsoft Visio or automatically generated via network mapping software, helping teams plan, troubleshoot, and secure IT infrastructure.

18
Q

Asset documentation tracks t

A

he asset procurement life cycle, which includes: approving changes, budgeting and selecting vendors, securely deploying the asset, maintaining it during use, and safely disposing of it by removing sensitive data before decommissioning.

19
Q

Each asset record should include

A

procurement documentation like invoices, warranty or support contracts, and contact details, while software entries must also track licensing information, including allocated devices or users and any usage limits.

20
Q

Assigning assets to users or security groups ensures

A

clear accountability and management responsibility, avoiding the risks of anonymous or shared access.

21
Q

Linking inventory records to product documentation and knowledge base articles enhances

A

support by enabling self-service, providing context for recurring issues, and streamlining diagnostics through asset history and verified resources.

22
Q

knowledge base (KB)

A

is a centralized repository of information used to store, manage, and share knowledge within an organization or for its customers.

23
Q

Change management encompasses

A

structured policies and procedures designed to minimize disruption from configuration changes, ensuring that updates to systems or services are planned, tested, approved, and documented—closely aligning with configuration management to maintain system integrity and operational stability.

24
Q

The ITIL Configuration Management Model outlines

A

best practices for managing IT services by defining service assets, configuration items (CIs), and their secure configuration and performance baselines, with the main challenge being how much detail to document and maintain—especially during system changes.

25
A change request documents
A change request documents the **need, purpose, and scope** of a proposed adjustment—whether reactive or proactive—and outlines its risks, benefits, affected systems, and success criteria, all formalized in a request-for-change (RFC) for approval.
26
Change Advisory Board (CAB)
Normal or minor changes may be approved by a supervisor, but **major changes require review by a Change Advisory Board (CAB)**, which evaluates business justification, technical feasibility, and risks—with representation from stakeholders, implementers, and budget approvers.
27
Risk analysis assigns a risk level to
a proposed change—based on quantitative metrics or qualitative insights—to guide approval decisions and prepare stakeholders for potential impacts.
28
Testing and implementing a change involves
assigning a responsible person, conducting pre-implementation testing (often in a sandbox), scheduling during low-risk windows, notifying stakeholders, and preparing a rollback plan in case issues arise.
29
End-user acceptance is fostered by involving
user-focused stakeholders during change planning, conducting user acceptance testing (UAT) for impactful updates, and providing training and priority support to ease transitions and reduce resistance.
30
An Acceptable Use Policy (AUP)
defines appropriate usage of organizational resources to prevent misuse, enforce security, and meet compliance requirements—often supplemented by visible reminders like login splash screens to reinforce regulated behaviors.