B3 Flashcards
The COSO Enterprise Risk Management Framework emphasizes that risk increases when an organization changes its cloud deployment model from:
Private to public.
What is an Edge-enabled device?
Decentralization of computing power. Spreads out the distribution.
What is a threat landscape?
The environment in which the company operates, classified as normal or high because of geopolitical threats or issues, the industry sector, or economic issues.
What is enterprise strategy?
Include a primary and secondary strategy, such as growth/acquisition, innovation/differentiation, cost leadership, and client service strategies.
What is the IT implementation methods?
used to implement new IT projects, such as Agile, DevOps, Waterfall, or a hybrid of such methods.
What does Infrastructure as a service manage (IaaS)?
1
Focuses on outsourcing services, storage, hardware, network services, am and network components.
Third most control. Runtime is not managed by this service.
What does software as a service manage (SaaS)?
3
Purchase of service through licensing offering access to the applications
Everything they have full control, Including runtime.
What does platform as a service manage (PaaS)?
2
Facilitates the creation of programs and delivery of services such as buildings and online platforms to sell merchandise
Almost everything, they don’t have control of application design, tools, or data.
An accounting information system (AIS) is distinguished from an enterprise resource planning (ERP) system by the fact that:
An AIS stores financial data, whereas an ERP stores shipping data.
What is Business as a service (BPaaS)?
Where companies outsource payroll, billing, and logistics services.
What is a firewall?
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
What is a server?
Coordinates computers within a network and executes commands in response to requests from devices.
What does layer 7 (application) do?
Interface between applications that a person uses and the network protocol needed.
What does layer 6 (Presentation) do?
Transforms data received from application layer into a format that other devices using the OSI model can interpret. (Encryption occurs in this layer)
What does layer 5 (Session) do?
Allows sessions between communicating devices to be established and maintained. (Dialog with each other)