Module 4: Systems Performance Management Flashcards
refers to the study of an entire system, including physical hardware and components and software, and how it operates
System Performance
What does the enterprise want to ensure with regard to system performance?
- The system is performing as expected
- Issued are identified and addressed
IS Architecture: What is the hierarchy of the IS architecture?
Base: Computer Hardware and Firmware
Middle: Kernel/ Nucleus
Top: Operating System
IS Architecture: Is a highly privileged area where access by most users is restricted
Nucleus
IS Architecture: What do you also call OS processes?
System software
IS Architecture: are a collection of computer programs used in the design, processing and control of all computer applications used to operate and maintain the computer system
OS processes
IS Architecture: What is the most important part of the architecture?
The OS and Nucleus/Kernel
IS Architecture: The software developed must be compatible with the OS (T or F)
T
IS Architecture: What are the components of the system software?
- System Utilities.
- Programs
IS Architecture: What are the functions of system software?
- Ensure integrity
- Controls the flow of programs
- Events in the computer
- Manage interfaces with the computer
Operating System: The OS contains programs that interface between the ___, ____ and ___ ___
user , processor, applications software.
Operating System: What are the main functions of the operating system?
- Scheduler
- Traffic Controller
Operating System: all past
OSs possess a virtual storage memory capability that allows programs to use and reference a range of addresses greater than the real memory. (T or F)
False. Modern OS
Operating System: Match the description with the type of computer.
capable of managing extensive resources and
many concurrent operations
capable of cataloging files and loading
programs to be effective
capable of accommodating multiprocessing,
multitasking and multithreading
- Mainframe computer
- Single-user computer/ Microcomputer
- Server with multiple users
Operating System: Virtual servers can use different types of OS (True or False)
True. Once a physical server is partitioned into different virtual servers. They act as physical servers
Software Integrity Issues: What should the hardware and software have to address the integrity issues?
- Ensure that privileged programs cannot be interfered with by user programs
- Protect itself from deliberate and inadvertent modification
- Process Isolation (Traffic Control)
- Enforcement of least privilege
Software Integrity Issues: Who is responsible for implementing authorization techniques?
IS management
Activity logging and reporting options: What is a common way to secure logs, centralize, and analyze?
Security Information and Event Management (SIEM) Software
Operating System Reviews: What are the areas to review?
- System software selection procedure
- Feasibility Study and selection process
- System software Security
- IT Asset Management
- System Software Implementation
- Authorization Documentation
- System Documentation
- System Software Maintenance Activities
- System software change controls
- Controls over the installation of changed system software
is designed to prevent unauthorized access to data, unauthorized use of system functions and programs, and unauthorized updates/changes to data, and to detect or prevent unauthorized attempts to access computer resources.
Access Control Software
is used to transmit messages or data from one point to another either locally or remotely. Likewise,
responses back to the user are handled in the same manner
Data communications software
Data communications software: Prioritize message transmissions locally
False. Either remotely or locally.