ICE DELIVERABLES
🇬🇧
In Inglés
In Inglés
Practique preguntas conocidas
Manténgase al día con sus preguntas pendientes
Completa 5 preguntas para habilitar la práctica
Exámenes
Examen: pon a prueba tus habilidades
Pon a prueba tus habilidades en el modo de examen
Aprenda nuevas preguntas
Modos dinámicos
InteligenteMezcla inteligente de todos los modos
PersonalizadoUtilice la configuración para ponderar los modos dinámicos
Modo manual [beta]
Seleccione sus propios tipos de preguntas y respuestas
Modos específicos
Aprende con fichas
Completa la oración
Escuchar y deletrearOrtografía: escribe lo que escuchas
elección múltipleModo de elección múltiple
Expresión oralResponde con voz
Expresión oral y comprensión auditivaPractica la pronunciación
EscrituraModo de solo escritura
ICE DELIVERABLES - Marcador
ICE DELIVERABLES - Detalles
Niveles:
Preguntas:
78 preguntas
🇬🇧 | 🇬🇧 |
Name the 7 Categories | PROACTIVE IT MAINTENANCE SERVICES IT TECHNICAL SERVICES IT ADMINISTRATIVE SERVICES TRANSPARENT IT SERVICES CYBERSECURITY SERVICES REDUNDANCY & FAILOVER TESTING SERVICES IT AUDIT SERVICES |
PROACTIVE IT MAINTENANCE SERVICES | Proactive Network Services Proactive Systems Services Proactive Security Services Proactive Endpoint Security Services |
IT TECHNICAL SERVICES | Unlimited Helpdesk Support Unlimited Monitoring Support Team of Experts Backups Patch Management Secured Access Management |
IT ADMINISTRATIVE SERVICES | Ticketing & Trend Analysis Key Performance Index Quarterly IT Analysis |
CYBERSECURITY SERVICES | Network Security Scanning Systems Security Scanning Simulated Phishing Security Testing Cybersecurity Training |
REDUNDANCY & FAILOVER TESTING SERVICES | Backup Testing System & Network Redundancy Testing Wi-Fi Performance Analysis |
IT AUDIT SERVICES | IT Audit |
Proactive Network Services | Proactive maintenance of Network Infrastructure. Review logs and performance, identify issues, and open tickets to resolve. Reporting by Network Engineer to keep you informed on network stability, performance, etc. (Weekly) |
Proactive Systems Services | Proactive maintenance of Systems Infrastructure (servers, devices, etc.) Review logs, and performance, Identify issues, and open tickets to resolve. Reporting by Systems Engineer to keep you informed on systems infrastructure (Weekly) |
Proactive Security Services | Proactive maintenance of Network Security Infrastructure. Review logs and performance, identify issues, open tickets to resolve. Reporting by Security Engineer to keep you informed on security measures (Weekly) |
Proactive Endpoint Security Services | Proactive Endpoint (Device) Security Services. Check backups, OS and Application updates, Antivirus Software Updates, and open tickets to resolve (Weekly) |
Unlimited Helpdesk Support | 24x7x365 Unlimited remote helpdesk user support services to troubleshoot and resolve any IT issues |
Unlimited Monitoring Support | 24x7x365 Proactive monitoring, alerting, and response to detect, prevent, and mitigate IT incidents |
Team of Experts | Specialized team of technical engineers assigned |
Backups | Monitoring and maintain your data backups |
Patch Management | Patch management services to address vulnerabilities, bugs, or security issues |
Secured Access Management | Secured cutting-edge PAM (Privileged Access Management) solution from Delinea that protects access while allowing users to operate efficiently |
Manage Licenses and Warranty | Hardware Warranty, Software Licensing & Subscription tracking to consolidate software/subscriptions, mitigate downtime risk, and ensure software use compliance |
Ticketing Services | Ticket & trend analysis and reporting (Weekly & Monthly) to identify recurring issues and improve processes, systems, etc., thereby improving efficiency |
IT Meeting | Weekly IT Meetings to discuss ongoing projects, resolve immediate issues or concerns, and plan for upcoming tasks or initiatives |
Procurement | Assist with hardware, software & licensing procurement to negotiate cost savings, optimize hardware/software, and maintain consistency |
Ticketing & Trend Analysis | Ticket & trend analysis and reporting (Weekly & Monthly) |
Key Performance Index | Monthly Key Performance Index Report (KPI) to track trends and better tailor our services to your specific needs |
Quarterly IT Analysis | Quarterly Business Report to evaluate your quarterly goals plan for any necessary adjustments, improvements, etc |
Network Security Scanning | Internal and External Security Scanning, Analysis, and Remediation to prevent, identify, and mitigate network threats (Quarterly) |
Systems Security Scanning | Systems Security Scanning, Analysis, and Remediation to prevent, identify, and mitigate Systems threats (Quarterly) |
Simulated Phishing Security Testing | Check your organization's phishing awareness and see how many of your employees are Phish-prone. Train employees accordingly (Half-Yearly) |
Cybersecurity Training | Conduct Cybersecurity and Infosec training that ensures users are up-to-date on best practices to prevent breaches and attacks (Half-Yearly) |
Backup Testing | Backup Restoration Testing and Report to ensure data is recoverable in the event of a disaster, incident, or to comply with regulations (Quarterly) |
System & Network Redundancy Testing | Systems & Network Redundancy Testing and Report that eliminates single points of failure and mitigates downtime risk (Half-Yearly) |
Wi-Fi Performance Analysis | Wi-Fi Spectrum Analysis and Report to optimize the performance and reliability of your network (Half-Yearly) |
IT Audit | IT Audit and Recommendations to help you plan for potential expansion, compliance, and explore new opportunities to further optimize IT (Yearly) |
Additional Notes on 4 Weekly Reports | Performance issues, ISP bandwidth, Firewall, or systems performance and load then those recommendations are put into regular IT meetings with clients, so we can plan, it is more of an partnership than just a service provider. |
Additional Notes Unlimited Help Desk Support | Can also check on existing tickets, not just new tickets. If you speak to one of our reps at 2 in the morning, you will have a live person assisting the user, not someone on-call. We have 3 working shifts running, people are working from office, not sleeping, our to an engagement, at their desk ready and waiting to assist. |
Additional Notes on Secured Access Management | Cybersecurity is paramount to us, and most of our competitors do not have these sophisticated applications that they are running, even the network and system admins do not get to see the passwords they are only available to the managers. So if there is an engineer turnover they don't know passwords, in most cases, you would need to change the passwords, we don't need to do that because they don't see the passwords. With this advanced password management software it already rotates passwords, so there is a check-in and check-out. Since we are SOC 2 certified all of these actions from administrators are are recorded, so you can see everything they did and when they did it for audit purposes. There are multiple layers of security built into these tools. |
Additional Notes on Procurement | We have a dedicated procurement depart that does nothing but procure hardware and software licenses. We managed licenses and warranties. We have an asset management system, that is already programmed so if is expires in 45 days, for example, it automatically opens a ticket for the procurement department to submit a quote to you for approval. We won't purchase any hardware or software without your approval. Everything is in our client's name. We are resellers who help secure a discounted price and pass it on to you. You do not have to purchase through us, but we will still track those assets. |
Additional Notes on System & Network Redundancy Testing | As an IT company, they deploy architecture for redundancy but often they (internal or MSP) do not do those simulated tests, for example, if you have a dual ISP, if are doing dual fail-over testing you need to simulate and then switch off one of the ISPs and see if the traffic is going over if you ware running multiple virtual hosts you want to make sure failover is happening, network wise as well for example switches. Same with backups, how many times do companies restore backups to make sure they are recoverable? All of this testing takes a lot of time and with us, this is already built into our fixed pricing model. Wifi performance analysis we have very sophisticated tools that scan the entire building, to see what frequency you are using, where are the collusions happening, what microwaves or tools are affecting, are your neighbor's access points interfering with yours, that provides us with heatmaps which tell us which frequencies need to be adjusted. All of this is documented in reports and shared with the clients. |
Additional Notes IT Audit | 3 goals of the audit - give you the lay of the land and the 3 areas we look at are your security, performance, redundancy, and failover. These annual audits enable us to map out what changes to the infrastructure will need to be made to accommodate growth so you can better plan regarding budget allocation. We want to make sure we align with the client for example when you are starting we don't want to put in too much redundancy but as you scale you need to add to it. |
Layer 2 vs Layer 3 | Layer 2 and Layer 3 differ mainly in the routing function. A Layer 2 switch works with MAC addresses only and does not care about IP addresses or any items of higher layers. Layer 3 switch, or multilayer switch, can do all the job of a layer 2 switch and additional static and dynamic routing. That means, a Layer 3 switch has both a MAC address table and an IP routing table and handles intra-VLAN communication and packet routing between different VLANs. |
Hypervisor Type 1 | Native or bare-metal hypervisors These hypervisors run directly on the host's hardware to control the hardware and to manage guest operating systems. For this reason, they are sometimes called bare-metal hypervisors. |
Hypervisor Type 2 | These hypervisors run on a conventional operating system (OS) just as other computer programs do. A virtual machine monitor runs as a process on the host. Type-2 hypervisors abstract guest operating systems from the host operating system. |
Hypervisor | A software that you can use to run multiple virtual machines on a single physical machine |
Hypervisor Image | Hypervisor Image |
Hyper-V Host | The physical computer that provides the resources, including processing power, memory and disc usage for your virtual machines |
VMware | A computer software program that allows you to install a virtual operating system within any operating system |
Virtual Server | A software-based representation of a physical server. The function that abstracts CPU, memory, storage and network resources from the underlying hardware and assigns them to VMs is called a hypervisor |
Backup Software | A computer program that makes a copy of your files and folders or your complete system, including the operating system, applications and data. Advanced applications allow you to make multiple backups so that if one backup is damaged or unavailable, you have another with which to recover your data and/or systems. |
SAN | A Storage Area Network (SAN) is a specialized, high-speed network that provides block-level network access to storage |
Difference between SAN and Cloud storage | The difference between storage area networks and cloud storage is that SAN systems are hosted through a company's own servers, while the cloud stores it virtually via internet servers |
SAN Image | SAN Image |
NAS | Network-attached storage (NAS) devices store and share data for multiple computers, that can be accessed remotely. |
DAS | Direct-attached storage (DAS) is a type of storage that is attached directly to a computer without going through a network. |
SAN vs NAS vs DAS image | SAN vs NAS vs DAS image |
NAS vs SAN image | NAS vs SAN image |
NAS vs SAN setup image | NAS vs SAN setup image |
What is a Tape Library | A collection of magnetic tape cartridges and tape drives |
What does a Tape Library do? | Tape libraries and autoloaders automate backups and archives with multiple tapes. Tape libraries offer more capabilities than autoloaders, but are often far more expensive, as well as more complex because they have more tape drives. A tape autoloader is a step up from a single tape drive for backup and archiving. |
Switch | A network switch forwards data packets between devices. Switches send packets directly to devices, rather than sending them to networks like a router does. |
Layer-3 Switches/Routers | A Layer 3 switch functions as both a switch and a router. |
VLAN | Virtual Local Network (VLAN) is a subnetwork that takes groups of devices on a larger network and creates a virtual LAN for those devices, effectively separating them from the other devices on the network. This achieves the same ends as WLANs are able to achieve naturally through the use of separate channels and lends a LAN much more flexibility. |
WLAN | A wireless local area network can be considered a subcategory of regular local area networks. By definition, in order to be within range of a wireless access point, a device must be local to that access point. Wireless networks differ, though, in that they use the air as a shared hub through which they transmit data as opposed to discrete cabling. We know this, of course, as WiFi. |
LAN | A Local Area Network (LAN) is a network of devices connected across short distances, all located within a single, defined area. For example, this could be the network within a household or a business, or even cover an area as diverse as a college campus. |
WAN | Wide Area Network (WAN) connects multiple smaller networks over larger distances. This opens up a vast range of new opportunities for computers to share data and information. |
VPN | Virtual Private Network (VPN) offers a unique combination of privacy and remote access. When you use a VPN, you can send and receive data as if you were a part of a private network, even though you are doing so from a different location. |
2 VPN Principals | First, for businesses that need to provide secure access to their private network to staff working remotely. Second, users can effectively create a virtual network, ‘become’ a part of it and appear to the wider internet as part of that virtual network. This creates a method of masking your identity and true IP address/location when you’re interacting with public networks. This offers tremendous value in terms of privacy and internet security. |
MAN | Metropolitan Area Network connects different organizations |
LAN vs MAN vs WAN image | LAN vs MAN vs WAN image |
Layer 2 switch | A traditional network switch port that operates in the network data link layer or the "layer 2" of the OSI model of network connection. Purely operating within the network's hardware layer, these switches forward data packets based on the MAC addresses specified. |
Layer 2 vs Layer 3 | Layer 2 and Layer 3 differ mainly in the routing function. A Layer 2 switch works with MAC addresses only and does not care about IP addresses or any items of higher layers. Layer 3 switch, or multilayer switch, can do all the job of a layer 2 switch and additional static and dynamic routing. That means, a Layer 3 switch has both a MAC address table and an IP routing table and handles intra-VLAN communication and packet routing between different VLANs. |
Access Points | A device that creates a wireless local area network, or WLAN, usually in an office or large building. An access point connects to a wired router, switch, or hub via an Ethernet cable, and projects a Wi-Fi signal to a designated area. |
Load Balancers | Acts as the “traffic cop” sitting in front of your servers and routing client requests across all servers capable of fulfilling those requests in a manner that maximizes speed and capacity utilization and ensures that no one server is overworked, which could degrade performance. |
Point to Point connections | A private data connection securely connecting two or more locations for private data services. A point to point connection is a closed network data transport service which does not traverse the public Internet and is inherently secure with no data encryption needed. |
UPS | Uninterruptible power supply, is equipped with battery backups that kick in during a power failure, keeping your network equipment running smoothly. This protects your equipment from damage and ensures you don't lose any unsaved work. |
Startup | Designing, installing, configuring, and maintaining IT, Lab, and infrastructure. Implement IT processes and procedures based onbest practices. |
R&D | Assist with company’s rapid growth in terms of personnel and technology. Implement IT solutions to facilitate R&D endeavors. Implement, compute, and storage network on cloud and/or on-perm. Assist with office expansions. |
Clinical Trials | Implement solutions to meet regulatory and compliance requirements during different phases of clinical trials. Work with CROs. Implement advanced cybersecurity solutions. |
IPO | Work with investment bankers on IT due diligence. Ensure we meet SOX requirements |
Commercialization | Implement IT solutions to meet manufacturing and sales requirements. Also work with different partners and vendors.Provide global support |