Domain III – Information Technology – Section B: IT Infrastructure and IT Control Frameworks Flashcards

1
Q

Types of Processing Facilities

A

The information processing facility may be organized in one of three ways: Centralized, Decentralized, and Distributed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Centralized Facility

A

establishes only one computer department in the whole company where all the processing takes place. Data entry and retrieval may occur either at the centralized facility or from terminals connected to the facility.
=> All departments send requests to the centralized facility describing their processing and information requirements. Information is processed and sent back to the user departments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Decentralized Facility

A

establishes a separate computer facility to service the needs of each major department or unit in an organization. The department and its processing requirements dictate the size of each facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Distributed Computer Facility

A

In a distributed computer facility, both the centralized and decentralized facilities are combined
=> Users have their own computer equipment, but some computer terminals are connected to a bigger computer in a remote location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Processing Methods

A
  • Batch Method – data is initially input and grouped in temporary transaction files, before processing the data and updating the master file.
  • Online Method – data is processed immediately after each input rather than being stored in a temporary file for later processing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data file

A

is a file that includes raw data for processing. They may be categorized as: transaction file, master file, report file, output file, history file, backup file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Program file

A

is the file that includes the instructions required by the computer.
=> Program files may be: in‐house developed, custom‐made, ready‐made or off‐the‐shelf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Operating System

A

is a program consisting of a set of internal command instructions that allows the computer to utilize its own resources and direct its operations.
- It is the first program loaded to the system’s memory once started and remains active at all times.
=> The operating system acts as the interface between the physical hardware, the software applications, and the users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network

A

is a system of interconnected computers including the hardware and software needed to connect them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Local Area Networks (LAN)

A

are networks that serve users within a specified geographical area (usually within one building, or more than one building in close proximity).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wide Area Networks (WAN)

A

are networks that serve users across an extended geographical region using various transmission media for connectivity.
Types of WANs
- Integrated Services Digital Networks (ISDN)
- Virtual Networks (VNs)
- Wireless Networks
- Value‐Added Networks (VANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Metropolitan Area Networks (MAN)

A

are networks that fill that gap between LANs and WANs serving users within the same town or city dispersed over approximately 50 km.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Integrated Services Digital Networks (ISDN)

A

are WAN networks used for voice, data, and video communication through the use of digital switching and transmission technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virtual Networks (VNs)

A

are private secure networks working within a vulnerable network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wireless Networks

A

are WAN networks that allow users to access information instantly via wireless handheld devices such as mobile phones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Value‐Added Networks (VANs)

A

are networks that provide other services such as storage, data translation, and error correction.

17
Q

Mainframe

A

is the most powerful type of computers after the supercomputer. They are powerful computers that support the processing requirements of thousands of users (e.g., computers used by most banks and large corporations).

18
Q

Gateways

A

are a combination of hardware and software packages that has its own processor and memory. A gateway is used to interconnect networks that use different protocols by performing protocol and bandwidth conversions.

19
Q

Protocol

A

refers to the rules used by network operations to control the flow and priority of transmissions.

20
Q

Electronic Funds Transfer (EFT)

A

is the exchange of money via telecommunications. Money is transferred from one account to another electronically without the actual exchange or dealing with cash.

21
Q

Database Administrator

A

is generally responsible for the administration of the organizations’ database. The primary responsibility of a database administrator is to ensure that date is available, secured, and easily accessible as needed.

22
Q

Librarian

A

records, issues, receives, and safeguards all program and data files that are owned/used by the organization.

23
Q

Network Administrator

A

administers the technical and administrative functionality of the organization’s network.

24
Q

Help desk function

A

is a unit within the organization that responds to users’
technical questions. The help desk staff usually respond directly when resolving minor problems, however, may refer to the IT department, or help desks of suppliers when resolving more complex problems.

25
Q

Security Officer

A

ensures that the users are complying with the corporate security policy and that there are adequate controls to prevent unauthorized access to the system
including data, programs, and equipment.

26
Q

Systems Analyst

A

is responsible for defining user requirements and designing the system accordingly. The detailed design prepared by the systems analyst is used by the
programmers for creating the related program.

27
Q

Programmers

A

are responsible for developing and maintaining the software (both system and application software). Programmers convert the design prepared by the
system analyst into machine executable modules. They are also responsible for maintaining the software after it has been developed.

28
Q

Change Control

A

ensures that changes to programs have a minimal impact on processing and result in minimal risk to the overall system.

29
Q

COBIT

A

is a framework created by Information Systems Audit and Control Association (ISACA) for information technology (IT) governance and management. It is an IT governance framework and supporting toolset that allows managers to bridge the gap between control requirements, technical issues and business risks.

30
Q

COBIT‐2019 Principles

A
  • Principles for a Governance System: provide stakeholder value, holistic approach, dynamic governance system, governance distinct from management, tailored to enterprise needs, end‐to‐end governance system.
  • Principles for a Governance Framework: based on a conceptual model, open and flexible, aligned to major standards.
31
Q

COBIT‐2019 Objectives

A

COBIT‐2019 has developed 40 core governance and management objectives.

  1. Governance Objectives – are grouped in one domain, which is the Evaluate, Direct and Monitor
  2. Management Objectives – are grouped in four domains: (1) Align, Plan and Organize, (2) Build, Acquire and Implement, (3) Deliver, Service and Support, (4) Monitor, Evaluate and Assess
32
Q

Electronic Systems Assurance and Control (eSAC)

A

The eSAC model published by the IIA sets the stage for effective technology risk management by giving companies a framework to guide an evaluation of the e‐business control environment.

  • provides a framework to help management, corporate governance entities, and internal auditors understand evaluate, monitor, and mitigate technology risks.
  • examines risks in all organizational components, including customers, competitors, regulators, community, and owners.
33
Q

The eSAC model includes the following components:

A

 Organization’s Mission and Outcomes – The organization typically pursues its mission through establishing strategies and objectives consistent with its values.
 Control Context – A sound control environment helps the organization stay on its path as it moves from mission to results. The eSAC model adopts the broad control context from COSO
 Assurance Objectives – The eSAC provides control attributes that are particularly pertinent for e‐business activities (i.e. Availability, Capability, Functionality, Protectability, Accountability)