Podcast
Questions and Answers
Digital support services only include managing physical hardware.
Digital support services only include managing physical hardware.
False
Providing IT support involves fixing issues and offering training in software use.
Providing IT support involves fixing issues and offering training in software use.
True
Penetration testing is a form of digital support service in cyber security.
Penetration testing is a form of digital support service in cyber security.
True
Digital infrastructure support services focus solely on user training.
Digital infrastructure support services focus solely on user training.
Signup and view all the answers
An infrastructure technician should have knowledge of firewalls and Cisco routers.
An infrastructure technician should have knowledge of firewalls and Cisco routers.
Signup and view all the answers
SQL skills are not necessary for an infrastructure technician's responsibilities.
SQL skills are not necessary for an infrastructure technician's responsibilities.
Signup and view all the answers
Responding to security breaches is part of network administration.
Responding to security breaches is part of network administration.
Signup and view all the answers
Digital support services in cyber security exclude malware analysis.
Digital support services in cyber security exclude malware analysis.
Signup and view all the answers
Work within the IT Operating Model requires following established IT procedures.
Work within the IT Operating Model requires following established IT procedures.
Signup and view all the answers
Delivering a low level of customer service is acceptable within IT operations.
Delivering a low level of customer service is acceptable within IT operations.
Signup and view all the answers
Maintaining professional discipline within the team is unnecessary as long as tasks are completed.
Maintaining professional discipline within the team is unnecessary as long as tasks are completed.
Signup and view all the answers
Management may request employees to perform duties outside of normal business hours.
Management may request employees to perform duties outside of normal business hours.
Signup and view all the answers
Following IT processes and procedures is optional within the IT Operating Model.
Following IT processes and procedures is optional within the IT Operating Model.
Signup and view all the answers
On-call service is an example of a duty that may extend beyond normal business hours.
On-call service is an example of a duty that may extend beyond normal business hours.
Signup and view all the answers
High levels of customer service should only be considered during peak business hours.
High levels of customer service should only be considered during peak business hours.
Signup and view all the answers
Employees are encouraged to disregard procedures applicable to their department.
Employees are encouraged to disregard procedures applicable to their department.
Signup and view all the answers
Tier 1 support involves expert-level troubleshooting and requires deep knowledge of the product.
Tier 1 support involves expert-level troubleshooting and requires deep knowledge of the product.
Signup and view all the answers
Service desk engineers focus primarily on resolving user problems related to hardware and software.
Service desk engineers focus primarily on resolving user problems related to hardware and software.
Signup and view all the answers
If a Tier 2 support representative cannot solve an issue, it will be escalated to Tier 4.
If a Tier 2 support representative cannot solve an issue, it will be escalated to Tier 4.
Signup and view all the answers
The responsibilities of a service desk support analyst include directly handling user inquiries.
The responsibilities of a service desk support analyst include directly handling user inquiries.
Signup and view all the answers
Tier 3 support is generally composed of individuals who developed the software or product.
Tier 3 support is generally composed of individuals who developed the software or product.
Signup and view all the answers
Implementing and supporting firewalls is part of standard service desk operations.
Implementing and supporting firewalls is part of standard service desk operations.
Signup and view all the answers
A server engineer is responsible for managing data center operations.
A server engineer is responsible for managing data center operations.
Signup and view all the answers
Designing and documenting organizational standards is a key responsibility of service desk roles.
Designing and documenting organizational standards is a key responsibility of service desk roles.
Signup and view all the answers
Pestle analysis includes legal and environmental factors as key influences on the business environment.
Pestle analysis includes legal and environmental factors as key influences on the business environment.
Signup and view all the answers
Service desk support encompasses basic troubleshooting, such as identifying if a cable is plugged in.
Service desk support encompasses basic troubleshooting, such as identifying if a cable is plugged in.
Signup and view all the answers
Social factors in Pestle analysis do not include consumer views.
Social factors in Pestle analysis do not include consumer views.
Signup and view all the answers
Infrastructure engineers implement cloud technology and plan upgrades to systems.
Infrastructure engineers implement cloud technology and plan upgrades to systems.
Signup and view all the answers
Microsoft has not used social media for customer engagement and support.
Microsoft has not used social media for customer engagement and support.
Signup and view all the answers
Technological factors in Pestle analysis focus only on traditional technology.
Technological factors in Pestle analysis focus only on traditional technology.
Signup and view all the answers
Server engineers are responsible for performing backups of data regularly.
Server engineers are responsible for performing backups of data regularly.
Signup and view all the answers
Political factors in Pestle analysis refer to internal company policies.
Political factors in Pestle analysis refer to internal company policies.
Signup and view all the answers
Crypto mining poses a low threat due to its limited impact on hardware.
Crypto mining poses a low threat due to its limited impact on hardware.
Signup and view all the answers
An employee's poor security practices can lead to higher risks of cyber attacks.
An employee's poor security practices can lead to higher risks of cyber attacks.
Signup and view all the answers
Internal operational risks can compromise the entire infrastructure of a company.
Internal operational risks can compromise the entire infrastructure of a company.
Signup and view all the answers
Poor financial management has minimal impacts on a company's sustainability.
Poor financial management has minimal impacts on a company's sustainability.
Signup and view all the answers
The theft of non-sensitive hardware poses the same risk as the theft of hard drives containing sensitive data.
The theft of non-sensitive hardware poses the same risk as the theft of hard drives containing sensitive data.
Signup and view all the answers
Data breaches resulting in the leak of private data will likely enhance a company’s reputation.
Data breaches resulting in the leak of private data will likely enhance a company’s reputation.
Signup and view all the answers
Competition risk, while present, is considered a low threat as it encourages improvement.
Competition risk, while present, is considered a low threat as it encourages improvement.
Signup and view all the answers
If a company fails to maintain good standards, its reputation may remain unaffected.
If a company fails to maintain good standards, its reputation may remain unaffected.
Signup and view all the answers
Microsoft invested approximately 24.5 billion dollars in research and development in 2020.
Microsoft invested approximately 24.5 billion dollars in research and development in 2020.
Signup and view all the answers
Private sector organizations are primarily funded by government support.
Private sector organizations are primarily funded by government support.
Signup and view all the answers
Third sector organizations are primarily focused on making a profit.
Third sector organizations are primarily focused on making a profit.
Signup and view all the answers
Brand consistency can be a disadvantage for companies due to varying management of social media accounts.
Brand consistency can be a disadvantage for companies due to varying management of social media accounts.
Signup and view all the answers
Business to Consumer (B2C) refers to transactions between businesses only.
Business to Consumer (B2C) refers to transactions between businesses only.
Signup and view all the answers
The NHS is an example of a private sector organization.
The NHS is an example of a private sector organization.
Signup and view all the answers
Microsoft uses social media to allow new employees to socialize before starting work.
Microsoft uses social media to allow new employees to socialize before starting work.
Signup and view all the answers
Content backlash poses a risk to a brand's reputation.
Content backlash poses a risk to a brand's reputation.
Signup and view all the answers
Study Notes
Session 1 – 12/09/2024
- Digital support services are services that manage, maintain, and optimize a business's digital infrastructure and systems
- These services involve supporting users over the internet, through apps, email, or online forums
- IT support includes fixing problems, providing guidance, and training users on software use
- Maintaining services such as emails, servers, and Wi-Fi
- Digital support in cybersecurity involves responding to threats like malware and conducting penetration testing and malware analysis
- Digital infrastructure support services are core components of a network, including:
- Managing data in/out of the network
- Ensuring network operations (correct functioning)
- Maintaining server health
- Monitoring network
- Implementing security measures
- Responding to security breaches
- Security implementation
Homework
- Research infrastructure technician job roles (4 specific roles)
- Download relevant job specifications
- Explain the job responsibilities and roles
Job roles
-
Infrastructure Technician:
- Good knowledge of all Microsoft (both server and desktop) products
- Knowledge of Firewalls, IPS, and Cisco routers
- Ideally, exposure to IS27001 standards
- Basic SQL skills
-
IT Apprentice:
- Configure computers, network, and security devices
- Process customer returns and document all information related to them
- Record the items into stock and help the service desk manager with correctly recording details
Infrastructure Engineer
-
Responsibilities:
- Design, implement, and manage network and server infrastructure
- Monitor system performance and troubleshoot issues
- Collaborate with cross-functional teams for IT projects
- Provide technical support and guidance to users
Similarities of roles
- Design, implement, and manage network and server infrastructure
- Ensure a high level of customer service
- Update and maintain Service Desk documentation
Differences of roles
- Willingness to perform tasks outside normal business hours (e.g., on-call service or overtime)
Task 1: Internal Risks
- Human error: Incorrect training or simple mistakes by employees
- Technological risks: Computer failures or software issues
- Internal fraud: Unauthorized use of company resources by employees
- Employee practices: Poor security practices by employees
- Operational risk: Flaws in how the business operates
- Financial risk: Issues with incoming/outgoing finances
Task 2: External Risks
- Data risks: Customer/employee data at risk of leakage
- Data breaches: Private data leakage to the public
- Competition risk: Other companies offering similar services at lower rates
- Reputation risk: Poor company performance impacting reputation
- Cyber threats: Hacking, malware, phishing
Task 3: Cyber Security Policy
- A document outlining the company's security risks and measures to mitigate them, minimize, and control them.
Pestle analysis
- Political factors: Government regulations, political instability impacting the business
- Economic factors: Interest rates, economic downturn, material costs
- Social factors: Cultural values, trends impacting the business, social media impact on brand
- Technological factors: Digital transformations of technology
- Legal factors: Regulations and laws affecting the operation of business
- Environmental factors: Climate change, carbon footprint
Social Factors
- Population growth
- Age distribution
- Cultural barriers
- Consumer views
- Workforce trends
How Social media impacts Microsoft
-
Advantages:
- Customer engagement and support
- Increased brand awareness
-
Disadvantages:
- Risk to reputation (content backlash)
- Brand consistency challenges
- Examples: Online support, employee onboarding, dedicated customer support accounts
Measuring value of digitalization in business
- Sales: Closing deals with clients (internal or external), company sales
- Marketing: Publicity, attracting customers, ensuring the business is seen and the brand is understood
Digitalization in market research
- Surveys, collecting opinions from target groups to learn more about public opinion and opinions on product
Digitalization effects on communication and coverage via social media
- Positive: Free advertisement opportunities, higher visibility to more people
- Negative: Potential for negative publicity (offending people) and loss in revenue
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the fundamentals of digital support services, including IT support, cybersecurity measures, and the core components of digital infrastructure. It also highlights various roles within the infrastructure technician spectrum. Test your understanding of managing, maintaining, and optimizing digital systems.