Domain 4 - IS Operation Management Flashcards
What is the use of calculating hash sums?
Calculating hash sums of applications can be useful since doing so provides a quick method to test for future unauthorized application code modifications
What does “Online Monitor Reports” provide?
Online monitor reports provide a measure of telecommunication transmissions & determines whether transmissions are completed accurately
Best practice to effectively detect the loading of illegal software packages onto a network?
Periodic checking of hard drives
In DBMS, what is “Normalization”?
Normalization is a database design technique used to minimize redundancy & dependence in a database. The goal is to ensure data is organized in a way that minimizes data duplication which can lead to data inconsistencies & errors.
As such, “De-normalization” would increase data redundancy while “Normalization” decreases data redundancy.
Where should error codes & its recovery actions are found?
It is in application run manuals
What controls provides the greatest assurance of database integrity?
Performing table link/reference checks serves to detect table linking errors (such as completeness and accuracy of the contents of the database), and thus provides the greatest assurance of database integrity.
What does “enforcing referential integrity of foreign keys” prevents?
It prevents the deletion of customer record if the record is associated with linked order records in a related database
“Repeater” operates in which OSI layer?
Physical Layer (OSI Layer 1).
It is a networking device used to extend the distance of a network. A repeater receives a weak or damaged network signal, amplifies it, and then retransmits the signal to extend the network’s overall reach.
“Hub” operates in which OSI layer?
Physical Layer (OSI Layer 1).
A hub receives data from one device and then retransmits the data to all other devices connected to it. This means that all devices connected to a hub can hear all data transmitted over the network.
“Bridge” operates in which OSI layer?
Data Link Layer (OSI Layer 2).
A bridge reads the Media Access Control (MAC) addresses of the devices in the network, and it only passes data between network segments if the destination device is located on a different segment from the source device. This helps to control the flow of data within the network and reduces network congestion.
“Switch” operates in which OSI layer?
Data Link Layer (OSI Layer 2)
Similar functionality as bridge but has more advanced features, such as virtual LANs (VLANs), Quality of Service (QoS), and advanced security features. Switches also typically have higher port density, allowing more devices to be connected to the network.
What is main function of “Quality of Service (QoS)” as found in switches?
Prioritize different types of network traffic and ensure that critical applications receive the necessary bandwidth and processing resources they require.
As such, main function of QoS is to optimize network performance by assigning priority to business applications & end users through the allocation of dedicated parts of the bandwidth to specific traffic.
This prevents network congestion, improve network efficiency, and ensure that network resources are used optimally.
Referential integrity characteristics
1) Ensures no record refers to a primary keys of a non-existing record, or null value
2) Is a data integrity principle that supports achieving faster performance/ execution in a database application
3) Prevents dangling tuples (record) in a database
4) Ensures that data are updated through triggers
When migrating an application program from test to production environment, best practice is?
Have the production control group copy the source program to the production libraries & then compile the program
Should a database administrator be allowed to patch or upgrade the operating system?
A database administrator should NOT be allowed to patch or upgrade the operating system since the function should be performed by a separate system administrator
What does OSI Transport Layer addresses?
The OSI Transport Layer addresses out-of-sequence messages through segment sequencing
What is the 7 layers of OSI model?
1) Layer 1 - Physical
2) Layer 2 - Data Link
3) Layer 3 - Network
4) Layer 4 - Transport
5) Layer 5 - Session
6) Layer 6 - Presentation
7) Layer 7 - Application
Which network topology is subject to single point of failure?
1) Bus topology physical layout is subject to total loss if one device, the serial bus media itself fails
2) Star topology can fail if the central hub or concentrator fails
Which layer in OSI model best manage traffic congestion?
OSI Layer 4 - Transport
Where does Bastion Host placed in a network?
Bastion Host directly connects to the untrusted network
What is a Firewall?
Firewalls are primarily implemented as a security measure to prevent unauthorized traffic between different segments of the network
What is a “Screened Host”?
Screened Host sits behind Bastion Host & is protected from direct exposure to the untrusted network (internet)
What is “Screened Subnet”?
Screened Subnet is an entire subnet of screened hosts. This is often the location for DMZ
The most critical element of SLA between organization & 3rd-party service provider is?
Stipulating how termination & transition of the contract or service is handled.
Also, the “right to audit”