A plus 1002 Sub-objective 4.1

4.1 Compare and contrast best practices associated with types of documentation

Welcome to ExamNotes by CertBlaster! This edition will cover objective 4.1 Compare and contrast best practices associated with types of documentation. In this section, we will cover the ideal methods for documentation. Dig in!

Click here for the A+ Practice Test Bundle for A+ Exams 220-1001 & 220-1002

Network topology diagrams

All IT departments should have and maintain network topology diagrams which depict current mapping information and connected devices. In the example shown below, observe that all of the devices encountered, such as Cloud resources, VLAN trunks and switches, routers, firewalls, and hosts, will be depicted in the network topology diagram along with their connection types, status, and addressing information. Note that all the addressing information is clear and up-to-date. You can see a problem in the /24 subnet at the upper-left. Hopefully you will start out on a smaller scale!

Network topology

Knowledge base/articles

A knowledge base refers to a collective repository for all pertinent information about IT operations. When an IT technician finds or troubleshoots a hardware or software issue, they should update their findings within the IT department’s knowledge base. They should also include installation and configuration details. This will help the IT department resolve recurring problems and help train new personnel.

Regulatory and compliance policy

Every organization is required to adhere to the laws, regulations, and policies relevant to their industry. Collectively referred to as the regulation and compliance policy, this policy will be tailored to the organization’s responsibilities. Maintaining compliance can be quite complicated and generally requires an individual or a whole department. As an IT technician, you will be expected to be aware of and follow the policies and guidelines in order to maintain compliance. Part of your organization’s onboarding process will include training in this area.

Acceptable use policy

Most employees will need to consent to an Acceptable Use Policy (AUP) as part of their hiring and training process. This policy will clearly define unacceptable practices for employees and will describe activity prohibited on company devices such as viewing objectionable content, unauthorized software installation, and even online shopping. Violation of this policy can be grounds for termination!

Password policy

The password policy covers the organization’s best practices regarding passwords. The policy will cover password length, special character requirements, expiration, and reusability.

Incident documentation

Any incident involving the violation of the AUP or any policies will be investigated internally and documented. Always report suspicious activity to your immediate supervisor and follow their instructions. Keep any evidence intact and document your observations clearly.

Inventory management

Corporate inventory should be monitored and controlled in order to allow tracking of valuable equipment within the organization. There are a few ways to accomplish this. Generally, Asset tags are affixed to computers and monitors. These tags are tamper resistant and can be tracked using asset tracking software. The tag will identify the company (owner) and have Barcodes that can be used with asset tracking software. RFID tags can also be used, allowing for a greater chance of recovering stolen equipment.

Click here for the A+ Practice Test Bundle for A+ Exams 220-1001 & 220-1002

That’s all for objective 4.1. See you in 4.2! Good luck on the test!

By continuing to browse this site, you accept the use of cookies and similar technologies that will allow the use of your data by CertBlaster in order to produce audience statistics- see our privacy policy.