S2 Flashcards

1
Q

Cloud Service Providers (CSP)

A

Offer virtual computing power and expertise to other companies on managing IT infrastructure. CSPs may also offer other complementary services such as primary business functions in addition to computing services such as accounting, payroll or digital marketing.

Cloud computing: uses shared resources over the internet to rent storage space, access to applications and services on a real-time basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Business process improvements:

A
  1. robotic process automation (designed to perform simple, repetitive tasks that require little to no judgement)
  2. Natural language processing software (type of tech that focuses on human interacting with a device, through the use of spoken natural language).
  3. Neutral networks (a form of AI modeled after human neurons that are built for complex decision making)
  4. Shared services
  5. offshore operations
  6. outsourcing

Outsourcing risks:
1. potential decrease in quality
2. service quality
3. productivity
4. language skills
5. security
6. missing or insufficient qualifications of those being outsourced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

COSO enterprise risk management framework

A

-provides guidance for cloud service provider transitions.

More risk with less control. risk increases when going public from private.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Accounting information systems (AIS):

A
  • solution that consists of transaction processing system (TPS), a financial reporting system (FRS), and a management reporting system (MRS).

TPS/FRS is a subsystem of an AIS.

The recording of transactions in an AIS through the TPS follows an order sequence of events that begins with entering data from source documents and ends with generating financial reports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Transaction cycles:

A
  1. revenue and cash collection cycle (selling to a customer) – bill of lading, sales invoice
  2. treasury cycle (facilitates the movement of capital that is generated and spent in the other cycles so that cash is managed effectively).
  3. Purchasing and disbursement cycle (the process in the AIS that handles purchase requisitions, purchase orders, order receipts and accounts payable). – receiving report
  4. general ledger and reporting cycles (involves updating the general ledger using journal entries when economic events occur in the other cycles).

5 Production and fixed asset cycles (involves using goods procured to create a product and track its related costs, but it does not involve the process of purchasing or paying for those goods. bill of materials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Blockchain:

A
  • developed to prevent Bitcoin from being replicated and to limit its initial creation so that there only a finite number of Bitcoins.

No centralized management overseeing its activity (decentralized) poses a potential threat since it could lead to a decreased level of accountability.

The immutability of blockchain can promote processing integrity.

To process high volume transactions on a blockchain: focus on preventative controls due to the volume and speed of transactions. reduces the need for manual review by a human. Combined with detective controls helps to minimize the likelihood of errors or failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Switch, server, router, firewall

A

Switch: Connects devices within a company’s network, does not protect a company’s IT resources.

Server: A machine that coordinates computers and applications within a network and execute commands in response to requests from those devices.

Router: like a switch, connects devices in a company’s network, but it performs higher functions such as assigning IP addresses.

Firewall: prevents unauthorized access as well as prevents employees from downloading malicious content. Filters network traffic security protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Multi-tenant cloud service:

A

serve cloud customers using virtual common resources, so that multiple orgs share the same virtual infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Business Continuity Plan (outlines the steps to return to partial/and/or full ops)

A
  1. Assess the key risks (Business Impact Analysis)
  2. identify mission-critical applications and data
  3. Develop a plan for handling these applications
  4. determine responsibilities for parties involved
  5. Test recovery plan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Disaster recovery plan (DRP)

A
  1. assessing risks
  2. identifying critical applications and data
  3. developing a plan to handle those applications and data
  4. Assigning personnel
  5. Testing the DRP

Storing duplicate files in an off-site location is a key component of DRP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Change management

A

Updating, fixing or installing new/existing IT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

System and information access controls:

A
  1. Physical access control – restrict access through tangible methods such as locks, barricades, fences, badge, surveillance.
  2. Data encryption– secure transmission of information through channels or applications that convert readable text into unreadable text during transit. related to human intervention.
  3. Logical access–user-authentication control that verifies identity to approve access.
  4. System availability control — ensures equipment are not damaged by natural disasters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

off-site locations

A

Hot sites have the essential hardware, data files and programs.

Warm sites have the necessary hardware, but backups must be delivered.

cold sites have all the electrical connections and other physical requirements but does not have the actual equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Change management methodology:

A

Agile: To address shortfalls of the waterfall method. Has a more flexible approach that is distinguished by its used of functional teams that are dedicated to different functions and improvement initiatives focused on prioritizing customer’s needs.

Kaizen: Auto manufacturer method. It focuses more on continuous improvement through small improvements over time rather than short sprints.

Waterfall: no customer input and change can be difficult to manage. Meetings and testing are not frequent.

Critical path: project management that identifies the longest sequence of dependent events to determine the earliest TBD completion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Patch Management

A

part of minimizing security threats and works in conjunction with vulnerability management solutions

to ensure updates are installed timely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Conversion Methods:

A

Phased system: also called gradual or molecular system. Gradually adds volume to the new system while using the old one.

Pilot approach: company runs a test, within a non-production environment, on a small scale to test its feasibility prior to full implementation.

Direct changeover: when one system is turned off or abandoned, and the new system is turned on immediately after.

a parallel system: there the new and old system, are both fully operational simultaneously for a period of time.

17
Q

Backups:

A

Incremental backup: only backup data that has changed since the last backup. New data and not historical data. Faster and consume less storage space then full back up.

Full backup: copy all newly generated data and all historical data.

Differential backup: captures new data each day and copy all previously generated data. Recovery is slower than full but faster than incremental

18
Q

Data Life cycle:

A
  • Preparation
  • Publication (data is released to users v=for various purposes)
  • Storage
  • Archival (data is moved from active systems to passive systems to free up storage resources for active systems, enhance active systems performance and reduce security risks.)
  • purging (te final stage where data is removed form the company’s storage systems )
  • Definition (the first step of the data life cycle, where orgs define what data is needed and where to capture or retrieve such data.
  • Synthesis ( bridging preparation and usage through the creation of calculated fields to prepare such data for quicker usage and analysis.)
19
Q

Database design technique:

A

normalization: reduces data redundancy and eliminates undesirable characteristics like insertion, update, and deletion anomalies.

Normalization rules divide larger tables into smaller tables and link them using relationships . purpose is to eliminate repetition and reasonably assure data is stored logically.

Normalize data:
1. determine whether the data conforms to the 1NF, which will make sorting and filtering data easier. Each field must contain only one piece of info and each record in every table must be uniquely identified. None of the non-key attributes should depend on other non-key attributes, per 3NF.

2nd step: Conforming data by requiring all non-key attributes in the table to depend on the entire primary key. Conform the data to the 2NF

3rd step: determine whether each column in the table describes only the primary key, establishing that none of the non-key attributes depend on the other non-key attributes.

20
Q

data storage:

A
  • data lake: contains both structured and unstructured data.

data warehouse: large repository that is centralized and used for reporting and analysis. Can be sued for reporting, to create mats, etc.

Data marts: contain specific, focused data as a subset of a data warehouse, Data that is relevant to specific groups or departments.

operational data store (ODS): Repository of transactional from multiple sources and is often an interim area between a data source and a data warehouse. data sets are smaller and are frequently overwritten as transactions are modified, processed and reported.

21
Q

Inner Join

A

uses only the matching (common) records.

22
Q

Third Normal Form (3NF))

A

3NF: eliminate any attributes that depend on both the primary key and other non-key attributes. Meaning, attributes should not have transitive dependencies, where they rely on other non-key attributes in addition to the primary key. Eliminating transitive dependencies.

23
Q

database schema

A

snowflake schema: dimension tables are broken down into multiple related tables rather than single table. More complex than the star schema since it requires more complex keys to link tables together. can be more flexible, as it allows for more detailed info to be stored about the dimensions.

flat model: generally considered the simplest type of database schema where the data is held in an individual table.

Star schema: most common schema for dimensional modeling , the simplest schema used for dimensional modeling. organized into a central fact table. Requires fewer keys to link tables together when compared to the snowflake schema.

hierarchical model: set of data with relationships whereas one piece of data may be considered a parent of numerous offspring pieces of data.

24
Q

4 Benefits of relational databases:

A
  1. completeness
  2. No redundancy
  3. Business rule enforcement
  4. communication and Integration of business processes
25
Closed Loop Verification
- critical change management step that involves continuously monitoring the output from the changes. comparing it with the desired outcome and calibrating the changes to minimize discrepancies from acceptance criteria.
26
Business Resiliency
- focuses on continuous operations and the ability to return to operations quickly. Requires organization to identify activities necessary to their core operations and the threats to those operations so that management can build a robust business resiliency program that mitigate those threats.
27
SQL system query language
- Where: primarily used for filtering records in the database based on specific criteria - From: specifies the table or tables from which data should be retrieved. Group by: used when needing to aggregate data into subtotals based on the designated attribute. Select: indicates which attributes are requested to view.