It Helpdesk
It Helpdesk
A user cannot access their email due to a temporary server outage. After 2
resolving the issue, document the steps taken and the outcome.
A user reported an issue with a critical system that IT cant handle. How to 4
escalate outside the level of competence?
A user reported that they could not connect to the workplace VPN and 4
submitted a screenshot of the problem. Using the given image, which of
the following best documents the resolution of this service request?
All things shown in the images are part of ? 1
Arrange the following steps in the correct order to use the organisation's 1
guidelines and standard scripts to resolve service requests/incidents
within the level of competence:
</br>A) Determine the level of competence required to resolve the
service request/incident.
</br>B) Access the organisation's guidelines and standard scripts for the
specific service request/incident.
</br>C) Follow the steps outlined in the guidelines and standard scripts to
resolve the service request/incident.
</br>D) Update the service request/incident records to reflect the steps
taken and the resolution.
</br>Threshold Calibration:
</br>Properly calibrate alert thresholds to minimize false positives. Fine-
tune sensitivity settings to reflect the normal range of system behaviour,
reducing the likelihood of triggering non-issue alerts.
</br>Baseline Establishment:
</br>Establish baseline behaviour for systems and applications.
Understanding normal activity patterns allows abnormal deviations to be
more easily identified and flagged as potential incidents.
</br>Human-In-The-Loop Validation:
</br>It involves having a human analyst review and confirm the alert
before initiating a response. Human intuition and contextual
understanding can provide valuable insights that automated systems
might miss.
</br>Question:
</br>What is a recommended best practice for validating automated
alerts to ensure genuine incidents?
You are working on a project and encounter an error message you are 2
unfamiliar with. What should you do?
You receive an IT service request that appears to involve a security breach. 3
According to Company Guidelines, security problems must be addressed
immediately and reported to the IT security staff. What would you do in
this situation?
Your monitoring tool alerts a critical system issue. What step you would 2
take to identify the nature of incident?