Chapter 14 Flashcards

(46 cards)

1
Q

Whats IT governance

A

process to ensure the efficiency use of IT for a company to achieves its goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is COBIT

A

The most widely used international standard for IT governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two categories of COBIT

A

IT Governance objectives-Creating the strategy
Management IT objectives - Turning the strategy into Action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the five COBIT

A

Governance : Evaluate,Direct ,Monitor
Management: Align,Plan and Organize
Management : Build, acquire and implement
Management: Deliver, service and support
Management: Monitor, evaluate and assess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Whats is Governance : Evaluate,Direct ,Monitor controls objectives

A

Ensure IT benefit delivery
Ensure risk realization
Ensure resource optimization

The only IT governance focused domain in COBIT 2019

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Whats is Management: Align,Plan and Organize control objectives

A

manage data , security and risk

Dress the way IT is used to meet organizational objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Management : Build, acquire and implement control objectives

A

manage changes , asset and project

Where the management assesses IT requirement , acquire the tech and implement them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is : Management: Deliver, service and support control objectives

A

manage operation
manage continuity
manage security services

operational side of IT (IT support)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Management: Monitor, evaluate and assess control objectives

A

manage system of internal control,assurance
Focus on existing IT and if they meet the organization objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does logical access controls do

A

identify ,authorize and provide users access to a computer info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does physical access controls do

A

help to keep track of who coming and going into the facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Role based access control (RBAC) is to

A

restricted network for individual with specific roles that have a criteria if they acess the system or not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

User access roles are

A

groups with predefined permission to which users are assigned , with each user assigned to only one role at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the hierarchy of user roles

A

Administrator
Creator
User
Read-only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Whats user authentification

A

process associating the username to each authorized user with unique identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Whats user access provisioning

A

formal process of granting access to a new user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What user access de-provisionning

A

formal process of changing users access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the two type of user access changes

A

Termination
Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Dormant access

A

user has not accessed the system for significant period of time but still has an active role that grant them access

20
Q

What are some control activities in logical security

A

Policies and procedures for suer access are documented
access to system is granted to each user based on the user business need
user access to systems is periodically reviewed for appropriateness
New access request are reviews and approved before being granted

21
Q

Why do company used data center

A

to protect the physical component on which the systems and data are stored

22
Q

What are the three keys environment of data center

A

Outside environment
Inside environment
Physical security

23
Q

Whats is Business continuity planning

A

set of procedures that the business take to protect employees , stakeholders and assts in a disruptive events

24
Q

Whats is business continuity planning subset

A

Disaster recovery

25
Explain a back up site
a physical location where company personnel will go to recover the systems and data after a disaster
26
whats a hot backup site
it's immedaitely operational after a disater, the most expensive option
27
Whats a warm backup site
equipped with servers ready for systems to be installed and contains only some equipment needed to ramp up the operations. It might take couple hours to warm a backup site the cost of maintaining is less.
28
Whats a cold backup site
is an empty room with no servers or equipment ready, the recovering takes a few days and weeks
29
When disasters strikes what are the 2 metrics
recovery time objective adn recovery point objective
30
Explain recovery time objective (RTO)
How much time systems can be down before it cause significant damage to the business
31
Recovery point objective ( RPO) :
How much data can be loss before it cause significant damage to the business
32
Whats a backup strategy
determine which data is being stored during data backup
33
Whats are the basic types of backup strategies
full differential incremental
34
Explain full backup strategies
the slowest methods , require a lot of store as it involves copying all existing data in it entirety every time
35
Explain differential backup strategies
this take moderate amount of time and storage space as it involve copying all data created since the most recent full backup every time
36
Eplain incremental backup strategies
This is the cheapest strategy as it involves copying only new or uptated data with each backup
37
Whats a backup cycle
determine when data is being stored during a data backup
38
What is the most common backup cycles
grandfather-father-son redundant backup
39
Grandfather cycle is based
on full backup once a months
40
Father cycle is based
on full backup once a week
41
Son cycle is based
Incremental or. differential backup , every day
42
Whats the change management process
a standardized process that decree risk by controlling the identification and implementation of required changes to a systems
43
What are the three steps of change management process
test environment model environment production environment
44
test environment is
is when developers can play without having any impact on the system
45
Model environment is
a recent copy of the live system which is used to implement the code in a environment that looks almost like production
46
Production environment is
the systems goes live and available for ends users