Domain 3: Enterprise Information Systems Flashcards

1
Q

Examples of technical security controls at the network level

A

Firewalls
IDPS (intrusion detection and prevention systems)
NAC (network access control)
VPN (virtual private networks)
DLP (data leakage protection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When does public media and secretary of HHS need to be notified about a breach?

A

If > 500 records are breached

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

45 CFR 164.308 (a)(1) stipulates that entities

A

Conduct or review a security risk analysis per 45 CFR 164.308 (a)(1) and implement security updates as necessary and correct identified security deficiencies as part of its risk management process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Formula for # of connection required using point-to-point interfaces?

A

N*(N-1)/2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Hick-Hyman Law state?

A

User response time (RT) is a function of # of possible responses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Fitts Law state?

A

Time it takes to track to an object with a cursor is a function of distance traveled (D) and width of the target (W)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk of maintaining a software product is transferred from the institution to the vendor by means of a?

A

Service Level Agreement (SLA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does Application Service Provider (ASP) model refer to?

A

Business that provides computer services over the internet. Benefit of ASP model is that heavy computing is performed off-site by vendor so investment in data center is not needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Norman’s Theory of Action

A

Human Information Processing theory. Separates each mental activity cycle into seven inter-related stages

  1. Forming the target
  2. Forming the intention
  3. Specifying an action
  4. Executing the action
  5. Perceiving the state of the world
  6. Interpreting the state of the world
  7. Evaluating the outcome
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is external representations

A

Example of external cognition, which is using external elements to help us make decisions. Use of the external element must change the cognitive task in some way.

Examples: Use of pen and paper to help with complex math; use of hand-drawn sketches to assist with brainstorming; graphical visualization of lab result to understand trends.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is distributed cognition?

A

Cognitive model focused on multiple people in a “cognitive system” collaborating to accomplish a shared goal.

Examples: crew working together to operate a ship; team of healthcare providers working together to care for a patient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3 categories of cognitive theories

A
  1. Human Information Processing
  2. External Cognition
  3. Distributed Cognition
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Difference between Application Service Provider (ASP) and Software as a Service (Saas)

A

In ASP model, user is given access to virtual or physical computer

In SaaS model, user access is provided via web-based application that connects with vendor’s central database via API. Instead of running 1000 instances of app, vendor only needs to run one instance. Multitenancy is term used when multiple users share the same software instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly