Chapter 8: Technology Management Flashcards

1
Q

What is the Role of the CIO (Head of IT)?

A

Manages all the other staff of the divisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Role of The Head of Production Support?

A

Provision of all server and desktop facilities to all users and for the day to day running and support of the production.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a DBA?

A

Database administrator.

Reviews and monitors everything, such as SQLs, back up and recivery stratergies etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who reports to them?

What is the Role of The Head of The Head of Development and Implementation?

A

Commissioning od new applications.

Following postions report to this:
- Business Analysts
- Application designers
- Programmers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Role of The Head of Testing?

A

Testing new software releases and implementing change control procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Role of The Head of Change?

A

Managing Major Change Programmes and Individual Projects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Very Straight Forward

What is the Role of The Head of Business Continuity and Recovery?

A

Managing the companies business recovery plans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Head of Information Security of CISO?

A

Overal direction and all security functions. Must comply with GDPR in the EU ans DPA in the UK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why Would a Firm Run and Employ Their Own Tehcnology Infrastructure?

A

To give them a competetive advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Difference Between a “Thin Client” and a “Fat Client”?

A

Thin = PC or Laptop with web applications
Fat = PC or Laptop with web and installed apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Business Engine?

A

A Programme that holds the programs for processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Most Common Database?

A

The Relational Database.

A number of tables that are related to one another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is SQL?

A

Structured Query Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Distributed System?

A

Is a configuration which contains a number of hardware elements that are connectedy some tramsission technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

3 reasons

What are the Reasons for Implementing a Distributed System?

A

1) Ensures the processing power is a close to the users as possible
2) To ensure a degree of robustness
3) To enable hardware to be easily added

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are OODBs?

A

Object Oriented Databases

17
Q

What is a “Go Live” Date?

A

The day a business change is set to occur

18
Q

DTUD

What are the Risk Types for Cyber Security?

A
  • Damage
  • Theft
  • Unauthorised Use
  • Disruption
19
Q

6

What are the Main Methods of Hacking?

A
  • Identity Fraud
  • Cyber Espionage
  • Phising
  • Malware
  • Botnets
  • Distributed Denial of Service Attacks
20
Q

What is Spyware?

A

Software that gathers information about a person or org and sends such information to a third party

21
Q

What is Ransomware?

A

Involves the criminal blocking access to a system, threatening to publish personal info unless ransom is paid.

22
Q

What is Scamming?

A

Low tech alternative the hacking/
.

23
Q

What is a Trojan Virus?

A

A virus that appears legitimate, but really contains mailicious code.

24
Q

What is a Botnet?

A

A network of computer controlled by cyber criminals using a trojan or else.

25
Q

What is a Distriuted Denial of Attacks?

A

An attempt to make a machine or network resource temporarily unavailible to its intended users.

26
Q

Prevention and Detection Techniques for Cyber Attacks?

All you can think if as there is 11

A
  • Conduct an Impact Analysis
  • Staff Training
  • Personal and Portable Devices
  • Be open and aproachabel with customers (so they make you aware)
  • Install vulnerability scanner
  • Identify where firewalls are needed
  • Enryption
  • Keep anti virus software up to date
  • Ensure physical security
  • Perform attacks
  • Regular defenses
27
Q

What is an Infrastructure Catalogue?

A

Inforation that needs to be collated to advise a help desk

28
Q

What are the 2 Categories for the Help Desk Funtion?

A
  • Planned admin or preventaive maintenance activities
  • Unplanned emergency activities
29
Q

What is “Follow the Sun” Support?

A

24 hour help line that operates to cater for more than 1 time zone.

30
Q

What is a Change Control Procedure?

A

Processes designed to prevent software or hardware from being amended without control, auditability and review of the impact parties.

31
Q

What are Version Control Systems?

A

Software applications that manage multiple revisions of the same unit of information.