Domain 4 - IS Operations & Business Resilience Flashcards
RFID (radio frequency identification)
Uses radio waves to locate tagged assets within a limited radius
A tag includes:
A microchip and an antenna
6 activities needed to develop a risk management program
- Identify assets
- Identity threats and vulnerabilities
- Impact analysis
- Risk prioritization
- Control evaluation
- Implementation of appropriate controls
Availability reports
Indicates time period the computer is operating & available for use ; helps determine downtime
Hardware error reports
Identifies system failures & initiates corrective action
Asset management reports
Inventory of assets/network-connected equipment
Utilization reports
Determines level of use of systems; used to predict resource requirements
System downtime report
Indicates effectiveness of preventative maintenance programs (high downtime= program not effective)
When should preventative maintenance/maintenance functions be performed ?
During non-peak times
Source code ; object code
Readable by humans ; computers
- controlled best by date&time stamping
Job schedule
Program used to run various processes automatically; also automates tape backups and other maintenance
-reduced probability of error
EUCs (end user computing)
System where non programmers can create their own applications;
not subject to testing;
documented policy should be available to address risks
OS (operating system) architecture
- Base = computer hardware
- Nucleus = basic functions; restricted
- System software = process’s that support users
Free software (3)
Open source - can be listed, modified, or redistributed as required
Freeware - free but source code cannot be redistributed
Shareware - free for trial period with limited functions
How to determine unauthorized software
Using automated tool - scan entire network to capture list of installed software and compare to approved software list
Registry
System settings and parameters set in configuration files
Best method to determine control function within OS
Review of parameters setting
Which report optimizes configuration of a server ?
Server utilization reports
Hardware maintenance schedules should be validated against
Vendor provided specifications
What is a critical/key component in network management?
Change/configuration management
Objective of library control software
Provide assurance that program changes are authorized
Capacity management
The planning & monitoring of computing/network resources to ensure that the available resources are used efficiently and effectively
Problem management
To prevent reoccurrence of an incident by identifying root cause and taking action
Problem management steps (5)
- Report the exception
- Investigate
- In-depth analysis
- Root cause analysis
- Address issues identified
Incident management
Return to normal state as quickly as possible
Response time reports
Network management tool - identifies time taken by system to process an IT query by user
Downtime reports
Network management tool - tracks availability telecommunication lines and circuits
Online monitors
Network management tools - checks data transmission accuracy and errors