Module 4: Systems Performance Management Flashcards

1
Q

refers to the study of an entire system, including physical hardware and components and software, and how it operates

A

System Performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the enterprise want to ensure with regard to system performance?

A
  1. The system is performing as expected
  2. Issued are identified and addressed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IS Architecture: What is the hierarchy of the IS architecture?

A

Base: Computer Hardware and Firmware
Middle: Kernel/ Nucleus
Top: Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IS Architecture: Is a highly privileged area where access by most users is restricted

A

Nucleus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IS Architecture: What do you also call OS processes?

A

System software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IS Architecture: are a collection of computer programs used in the design, processing and control of all computer applications used to operate and maintain the computer system

A

OS processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IS Architecture: What is the most important part of the architecture?

A

The OS and Nucleus/Kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IS Architecture: The software developed must be compatible with the OS (T or F)

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IS Architecture: What are the components of the system software?

A
  1. System Utilities.
  2. Programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IS Architecture: What are the functions of system software?

A
  1. Ensure integrity
  2. Controls the flow of programs
  3. Events in the computer
  4. Manage interfaces with the computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Operating System: The OS contains programs that interface between the ___, ____ and ___ ___

A

user , processor, applications software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Operating System: What are the main functions of the operating system?

A
  1. Scheduler
  2. Traffic Controller
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Operating System: all past
OSs possess a virtual storage memory capability that allows programs to use and reference a range of addresses greater than the real memory. (T or F)

A

False. Modern OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Operating System: Match the description with the type of computer.

capable of managing extensive resources and
many concurrent operations

capable of cataloging files and loading
programs to be effective

capable of accommodating multiprocessing,
multitasking and multithreading

A
  1. Mainframe computer
  2. Single-user computer/ Microcomputer
  3. Server with multiple users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Operating System: Virtual servers can use different types of OS (True or False)

A

True. Once a physical server is partitioned into different virtual servers. They act as physical servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Software Integrity Issues: What should the hardware and software have to address the integrity issues?

A
  1. Ensure that privileged programs cannot be interfered with by user programs
  2. Protect itself from deliberate and inadvertent modification
  3. Process Isolation (Traffic Control)
  4. Enforcement of least privilege
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Software Integrity Issues: Who is responsible for implementing authorization techniques?

A

IS management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Activity logging and reporting options: What is a common way to secure logs, centralize, and analyze?

A

Security Information and Event Management (SIEM) Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Operating System Reviews: What are the areas to review?

A
  1. System software selection procedure
  2. Feasibility Study and selection process
  3. System software Security
  4. IT Asset Management
  5. System Software Implementation
  6. Authorization Documentation
  7. System Documentation
  8. System Software Maintenance Activities
  9. System software change controls
  10. Controls over the installation of changed system software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is designed to prevent unauthorized access to data, unauthorized use of system functions and programs, and unauthorized updates/changes to data, and to detect or prevent unauthorized attempts to access computer resources.

A

Access Control Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

is used to transmit messages or data from one point to another either locally or remotely. Likewise,
responses back to the user are handled in the same manner

A

Data communications software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Data communications software: Prioritize message transmissions locally

A

False. Either remotely or locally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Data communications software: A typical simple data communications system has three components:

A
  1. The transmitter (source)
  2. The transmission path (channel or line)
  3. The receiver
23
Q

Data communications software: it is responsible for maintaining integrity of the message passed (T or F)

A

False. Data communications software is only focused on correct transmission between 2 points

24
Data communications software: They operate in both LAN and WAN (T or F)
True.
25
Data communications software: What does the data communication application support?
1. Electronic Fund Transfer 2. Database Management System 3. Electronic Data Interchange 4. Internet forums and email
26
are system software used to perform maintenance and routines that are frequently required during normal processing operations.
Utility Programs
27
Utility Programs: What are the five functional areas of utility programs?
1. Understanding application systems 2. Assessing or testing data quality 3. Testing a program's ability to function correctly and maintain data integrity 4. Assisting in faster program development 5. Improving operational efficiency
28
Utility Programs: Determine the functional area based on the example programs - CPU and memory utilization monitors
Improving operational efficiency
29
Utility Programs: Determine the functional area based on the example programs - text editor, library copy, report generators
Assisting in faster program development
30
Utility Programs: Determine the functional area based on the example programs - output analyzer and network simulator
Testing a program's ability to function correctly and maintain data integrity
31
Utility Programs: Determine the functional area based on the example programs - data manipulation utilities, query facility
Assessing or testing data quality
32
Utility Programs: Determine the functional area based on the example programs - executive path analyzer and data dictionary
Understanding application systems
33
Utility Programs: Utility programs have the functionality of audit trails (T or F)
False. They usually function without producing audit trails
34
Software Licensing Issues: Identify which license type the definition describes - The software may be used, copied, studied, modified and redistributed as required. Open source is usually accompanied by the program source and a copy of the software license.
Open source
35
is a contract that establishes the terms and conditions under which a piece of software is being licensed (i.e., made legally available for use) from the software developer (owner) to the user.
Software licensing agreement
36
Software Licensing Issues: Identify which license type the definition describes - The software is free, but the source code cannot be redistributed.
freeware
37
Software Licensing Issues: Identify which license type the definition describes - The software may be free initially; however, this may only be on a trial basis or have limited functionality compared to the full, commercial version.
Shareware
38
Software Licensing Issues: Identify which license type the definition describes - Depends on the power of the server, specifically the number of the CPUs; could include the number of CPU cores
Per central processing unit (CPU)
39
Software Licensing Issues: Identify which license type the definition describes - Depends on the number of unique users of the system
per seat
40
Software Licensing Issues: Identify which license type the definition describes - Depends on the total number of users using the software within a predefined period of time
Concurrent users
41
Software Licensing Issues: Identify which license type the definition describes - Depends on how busy the CPU is or the number of users that are active at any one time
Utilization
42
Software Licensing Issues: Identify which license type the definition describes - Depends on the number of individual workstations (NOT users) that connect to the software
Per Workstation
43
Software Licensing Issues: Identify which license type the definition describes - Usually allows unlimited use of the software throughout an organization without the need to apply any of the rules above, although there may be some restrictions
Enterprise
44
Software Licensing Issues: Scan only the physical networks to check for installed software (T or F)
False. Check the entire network to make an inventory of all installed software
45
Software Licensing Issues: Is locking down usb ports and disabling software installation ethical
Yes because it prevents the users to install new software in the computers.
46
is the language in which a program is written.
Source code
47
Source code management: Source code is translated into what and by who?
Object code; Assemblers and compilers
48
Source code management: Source code is not an intellectual property (T or F)
False. IT is and should be protected
49
Source code management: What do you use to manage source code?
Version control system or revision control system
50
the planning and monitoring of computing and network resources to ensure that the available resources are used efficiently and effectively
Capacity Management
51
Capacity Management: What should be developed based on input from user and IS management to ensure that the business goals are achieved in the most efficient and effective way.
Capacity plan
52
Capacity Management: Whose input should be considered when making the capacity plan?
User and IS management
53
Capacity Management: How often should the capacity plan be updated?
At least annually
54
Capacity Management: Capacity management aims to consistently provide the presently required it resource (T or F)
False. Inlcudes future resource requirements
55
Capacity Management: How does capacity management save companies costs?
By deferring replacement expenses