[bs_icon name=”glyphicon glyphicon-chevron-right”] The Role of Measurement Measurement plays a critical role within ITIL®, both as a part of Continual Service Improvement, but also within Service Level Management and as an essential part of all processes. Measurements can be used for four basic purposes as shown below:
Monthly Archives:: February 2016
[bs_icon name=”glyphicon glyphicon-chevron-right”] Incident Management Incident Management is concerned with the rapid restoration of services and with minimization of impact to the business.
Service Operation [bs_icon name=”glyphicon glyphicon-chevron-right”] Overview The Service Operation phase of the Service Lifecycle is concerned with ensuring that services operate within agreed parameters. When service interruptions do occur, Service Operation is charged with restoring service as quickly as possible and with minimizing the impact to the business. [bs_icon name=”glyphicon glyphicon-chevron-right”] Business Value… Read more »
Service Transition Processes [bs_icon name=”glyphicon glyphicon-chevron-right”] Change Management Change Management is concerned with recording, evaluating, approving, testing, and reviewing changes to services, systems, and other Configuration Items.
[bs_icon name=”glyphicon glyphicon-chevron-right”] Change Authority In ITIL® the entity charged with approval of a Request for Change is called the Change Authority.
IT Security Management is the process concerned with the protection of IT assets (including services) from security threats.
[bs_icon name=”glyphicon glyphicon-chevron-right”] Normal Changes are changes which meet predefined criteria that qualify them for handling via the Normal Change Management process.
The ‘Four P’s of Service Design’ represent areas which should be taken into consideration when designing a service.
Capacity Management is concerned with ensuring that cost-effective capacity exists at all times which meets or exceeds the agreed needs of the business as established in Service Level Agreements.
ITIL also utilizes the RACI model as a generic tool for reviewing and assigning four key roles to any important task or activity.
The Service Desk provides a single point of contact between users and the IT organization.
[bs_icon name=”glyphicon glyphicon-chevron-right”] Peer to Peer – A peer to peer network is one in which lacks a dedicated server and every computer acts as both a client and a server.
Ethernet – Ethernet is the most widely-installed local area network ( LAN) technology.
[bs_icon name=”glyphicon glyphicon-chevron-right”] Frame Relay – Frame relay is a secure, private network that utilizes a logical path or “virtual circuit” to allocate bandwidth for high performance transmissions.
568A and 568B – The number 568 refers to the order in which the individual wires inside a CAT 5 cable are terminated.
Cable Types :
Wireless networks allow computers to comunicate without the use of cables using IEEE 802.11 standards, also known as Wi-Fi.
[bs_icon name=”glyphicon glyphicon-chevron-right”] What is a Firewall? A firewall is any hardware or software designed to prevent unwanted network traffic. Some firewalls are simplistic in nature;
[bs_icon name=”glyphicon glyphicon-chevron-right”] Introduction to Cryptography
Viruses, Trojan Horses, Worms Despite all the hype about viruses and worms, the Security+ exam actually does not heavily test on viruses and the like.
Computer System Architecture At the core of every computer system is the CPU and hardware that make it run.
Penetration testing is a series of activities undertaken to identify and exploit security vulnerabilities.
Tunneling, VPN, and IPSec
Single sign-on is an attempt to address a problem that is common for all users and administrators.
An IDS is designed to function as an access-control monitor. It can monitor network or host activity and record which users attempt to access specific network resources.
Exam Cram: LAN = Local Area Network WAN = Wide Area Network MAN = Metropolitan (or Municipal) Area Network PAN = Personal Area Network
[bs_icon name=”glyphicon glyphicon-chevron-right”] Custom PCs include: Audio/Video workstations – needs special A/V cards, fast hard drives and multiple monitors
#1 DON’T CRAM #2 DO PLAN #3 TAKE A BREAK #4 MIX IT UP #5 PICK YOUR TOPICS #6 FIND PRACTICE TESTS #7 USE TEST PREP MATERIALS
Wireless encryption protocols include :
Switches connect computers together in a LAN.
ATX 12V 2.x Power Supplies connect to the motherboard by way of 24-pin cable + 4-pin for CPU and 6 or 8-pin for video. Advantages of the ATX motherboard The ATX motherboard includes advanced control facilities, where the BIOS program continually checks the CPU temperature and voltages, the cooling fans RPM, etc. If… Read more »
IPv4 addresses are 32 bit dotted-decimal numbers (like 192.168.1.1) and can be statically (manually) inputed or dynamically (automatically) assigned by DHCP.
CompTIA 6-Step Troubleshooting Process:
Short for Universal Serial Bus, USB (pronounced yoo-es-bee) is a plug-and-play interface that allows a computer to communicate with peripheral and other devices.
Follow @ASM_Educational Here are the configuration for Basic Router Configuration When You Open a new router you will see Router> This is called user mode; then you type en=enable to get to enable mode Router# This is called privilege mode
Follow @ASM_Educational Get our complete tutorial in PDF To Find Out If Link is UP Switch#show ip int brief
Follow @ASM_Educational Get our complete tutorial in PDF To Find out if link is up and has Ip address Router#show ip int brief
[bs_icon name=”glyphicon glyphicon-expand”] Here is ASM’s A+ Bootcamp Students practical video lab. They are building a brand new PC as a part of their training program (Computer Cost is included in tuition). To Become Certified For CompTIA A+ Please Visit This Link ;