Welcome to Exam Notes by CertBlaster! This is our free study guide for Network plus 3.5 “Identify policies and best practices.” Enjoy!
A successful company will have a group of organizational policies to ensure strategic objectives and also regulatory compliance, adherence to corporate policy and the satisfaction of vendor agreements. These are high-level policies that affect the whole organization. We will here look at some of these policies and procedures as defined by the CompTIA exam objectives.
This agreement is applied to employees that have access to Personal health records. This including Doctors and staff. The employee agrees not to disclose any information relative to these records.
Weak, and compromised passwords are a primary threat to our system security. Your company will have a clear password policy the covers the length of the password, and the specifications for the character types that must be used. There will be a list of dos and don’ts. Do not divulge your password to anyone, be they a co-worker or your superior. Don’t leave the password written down and stored in your office. The length and complexity of your password are important, and it is equally important to safeguard your password.
Permitting wireless network access for a device is called on-boarding and the removal of a device is called off-boarding. Today’s office environments contain a mix of company assets and personal devices to perform work. Care must be exercised when permitting devices to access the network. Here mobile device management (MDM) software will allow greater control over this process.
All software is covered by a licensing agreement that you must accept before installation. This agreement contains information on your right to use the software and what information the software collects.
The Windows operating system is one of the largest examples of the international export of software. In Windows 10, versions were created for use in Europe (N) and Korea (KN). These versions contain all of the basic features of the operating system without the Windows Media Player, Music, and Skype.
DLP (data loss prevention) is a risk mitigation technique that prevents network data classified as sensitive from being downloaded, transmitted or copied.
A remote access policy outlines and clearly defines your company’s acceptable remote access methods for hosts. Adherence to this policy is crucial for workers connecting over insecure public networks and even home networks.
When an incident occurs the actions to be taken are laid out clearly in the Incident Response Policy. The document will contain the preparatory information the response team will need to act. The detection methods and threat authentication process is defined. The impact of an incident is quickly contained and further problems are prevented.
Bring your own device (BYOD) is the method of allowing employees to bring their own personal devices into the workplace. The permissions for these devices will be determined by the On-boarding / off-boarding section described above.
An Acceptable Use Policy (AUP) is where the company defines what and what is not acceptable use of company resources. You will sign and consent to this policy which is legally binding.
The Non-Disclosure Agreement (NDA) is a critical document to protect the company as a whole. It describes how data classifications like private and confidential are to be treated. As you advance in your career you will be exposed to more important information. A casual cup of coffee with a stranger is an opportunity for them to gain strategic information. Your NDA will address any breach and the penalties associated.
The system development lifecycle is a continuous process that consists of several distinct and clearly defined phases. The process is a plan that enables engineers and developers to manage a system from its inception through its useful life until its ultimate disposal.
– Initiation The process begins when a need is identified. Even better to capitalize on an opportunity. Here you will create a proposal.
– System concept development Now the fun begins. Your documentation should address the scope of concept., a cost-benefit analysis, feasibility study and a good risk management plan.
– Requirement analysis This phase covers user requirements and a functional requirements document.
– Design Here the detailed requirements are used to create a detailed design document that delivers the desired functionality.
– Development Here is where you use the information gathered to create a complete system. You will test the new system arduously creating databases, compiling programs and testing all aspects of functionality.
– Integration and test In this phase you demonstrate the system performance and adherence to requirements.
– Implementation Here you prepare the system for introduction to the production environment and resolve any issues.
– Operation and maintenance Here you describe the tasks necessary to keep the system running optimally.
– Disposition This phase describes the actions to be taken when a system is retired. Primarily data preservation is a key aspect here.
– Asset disposal All company assets should be tagged and logged for tracking. When a system is retired it is vital to remove and safely destroy any objects that can store data. Your local municipality can advise you in this area.
In all properly run corporations, safety is a top priority in the workplace. We’re not discussing paper cuts here but will look at some major factors you need to be aware of. The Occupational Safety and Health Administration (OSHA) oversees workplace safety from the federal level. They have established procedures for the use and disposal of hazardous material and other workplace guidelines. If your job includes a potential hazard you will be issued personal protective equipment (PPE). This can be a hard-hat, gloves and most importantly eye protection. There are other hazards in your space like cleaners, solvents and other potentially hazardous material. OSHA requires manufacturers to label products that are physically or environmentally hazardous. Like old faithful below.
Be aware of your surroundings at all times. Look out for things like wires that could trip someone. Assess the situations you find yourself in. For example, if you are asked to move something heavy try to determine its weight and center of gravity. Keep the object close to your body and lift with your legs. When lifting, do not strain, get help.
Well with Domain 3.5 you just concluded Main Domain 3.0, congratulations! We hope you enjoyed our free study guide for Network plus 3.5. See you in Main Domain 4.0!
By continuing to browse this site, you accept the use of cookies and similar technologies that will allow the use of your data by CertBlaster in order to produce audience statistics- see our privacy policy.