Chapter 3 - Information Systems Flashcards

1
Q

End Point Devices?

A

Any device that connects to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What Device is used to collect Environmental Data? Challenges?

A

Internet of Things Senors, Challenge is Secuity and not easy to upgrade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a UML Diagram sometimes called? What is it?

A

ERD & Visual Representation of a conceptual Data model that shows tables in a database and the Associations between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What Do Availability Reports Address?

A

Uptime and Downtime Durations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a CSP always responsible for? Examples?

A

Infrastructure - Networking, Storage, Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewall

What does it do?
Isolates what?

A

Device that controls the flow of data into and out of an information system at network entry points.
o separates or isolates a network segment from the main network while maintaining the connection between networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Switches

A

moves data between connected devices in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Servers
3 things they do?

A

are powerful computers that store, process, and manage data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Routers
A

infrastructure components that receive and send data packets to their intended destinations and determine the best path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Progressive Steps to Test Continuity plan

A
  1. Checklists - Help to execute the complete plan
  2. Tabletop exercise - Walkthrough a potential scenario
  3. Simulation - Perform all the tasks at the alternate site (except processing)
  4. Parallel – Process at both the primary and alternate sites to determine if they are the same
  5. Full interruption – Perform all tasks only at the alternate site.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BCP (business continuity plan). The correct sequence is:

A
  • Consider possible threats
  • Assess potential impacts
  • Evaluate critical needs
  • Establish recovery priorities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Recovery Time Objective (RTO)

Established how?
2 things it calculates?

A

maximum amount of downtime a business can tolerate
* Established by doing a business impact analysis (BIA)
o Calculates the cost of downtime
 Tangible – Loss of revenue
 Intangible – Harm to reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mean Time to recover (MTTR)

A
  • Tracks the average time it takes to restore a service or system after an outage.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which Backup is the most efficient for minimizing backup time and storage usage?

A

Incremental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which Backup has a longer restoration time than a full backup?

A

differential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Continuous integrations are validated how?
name order 1-4

A

automated test
1.unit - test on individual components /functions
2. integration - group testing of components /functions
3 system -all components are integrated and the whole system is tested
4. acceptance - final testing is done by end users

16
Q

What does Strategy development remediate?

A

It bridges the gap between the business impact analysis by looking at the risk and seeing how the business continuity plan should address it.

17
Q

What two steps are after the strategy development phase and what do they do?

A
  1. Provisions and process - measures and procedures are created to mitigate risks
  2. Resource prioritization - prioritizes and allocates resources to different identified tasks.
18
Q

Internally encrypted passwords

A

access control designed to prevent unauthorized access by use of a utility program to identify passwords.

19
Q

What control

1 automatically resubmits correct data
2. Ensures the integrity, accuracy, and completeness of data

A

Online data entry controls

20
Q

Who is responsible for networks and security, servers and storage, and infrastructure facility?

A

IAAS

21
Q

Who is responsible for infrastructure, networks and security, servers and storage, operating systems, and database and analytic tools?

A

Platform as a software

22
Q

Who is responsible for infrastructure, networks and security, servers and storage, operating systems, hosted apps, and databaseand analytic tools?

A

Software as a service

23
Q

How do you calculate system availability?

A

Downtown- agreed service time/ agreed service time

24
Q

What cloud service model is best suited for rapidly developing an application while minimizing capital expenditures?

A

Platform as a service

25
Q

What cloud service model is best suited for rapidly developing an application while minimizing capital expenditures?

A

Platform as a service

26
Q

Who is responsible for returning acknowledgments?

A

Gateways

27
Q

Snapshots, rootkits, and misconfiguration of the hypervisor are disadvantages of what?

A

Virtualization

28
Q

Detecting access from unauthorized components is an advantage of what?

A

Automated scans

29
Q

Multifactor authentication is considered what in defense in depth strategies ?

A

Technical control