Computer Support/Objectives/Operational Procedures
Appearance
4.1 Given a scenario, implement best practices associated with documentation and support systems information management.
[edit | edit source]
|
|
4.2 Explain basic change-management best practices.
[edit | edit source]
|
|
4.3 Given a scenario, implement workstation backup and recovery methods.
[edit | edit source]
|
|
4.4 Given a scenario, use common safety procedures.
[edit | edit source]
|
|
4.5 Summarize environmental impacts and local environmental controls.
[edit | edit source]- Material safety data sheet (MSDS)/documentation for handling and disposal
- Proper battery disposal
- Proper toner disposal
- Proper disposal of other devices and assets
- Temperature, humidity-level awareness, and proper ventilation
- Location/equipment placement
- Dust cleanup
- Compressed air/vacuums
- Power surges, under-voltage events, and power failures
- Battery backup
- Surge suppressor
4.6 Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts.
[edit | edit source]
|
|
4.7 Given a scenario, use proper communication techniques and professionalism.
[edit | edit source]
|
|
4.8 Identify the basics of scripting.
[edit | edit source]- Script file types
- .bat
- .ps1
- .vbs
- .sh
- .js
- .py
- Use cases for scripting
- Basic automation
- Restarting machines
- Remapping network drives
- Installation of applications
- Automated backups
- Gathering of information/data
- Initiating updates
- Other considerations when using scripts
- Unintentionally introducing malware
- Inadvertently changing system settings
- Browser or system crashes due to mishandling of resources
4.9 Given a scenario, use remote access technologies.
[edit | edit source]- Methods/tools
- RDP
- VPN
- Virtual network computer (VNC)
- Secure Shell (SSH)
- Remote monitoring and management (RMM)
- Microsoft Remote Assistance (MSRA)
- Third-party tools
- Screen-sharing software
- Video-conferencing software
- File transfer software
- Desktop management software
- Security considerations of each access method