Chapter 14 Flashcards

1
Q

Whats IT governance

A

process to ensure the efficiency use of IT for a company to achieves its goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is COBIT

A

The most widely used international standard for IT governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two categories of COBIT

A

IT Governance objectives-Creating the strategy
Management IT objectives - Turning the strategy into Action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the five COBIT

A

Governance : Evaluate,Direct ,Monitor
Management: Align,Plan and Organize
Management : Build, acquire and implement
Management: Deliver, service and support
Management: Monitor, evaluate and assess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Whats is Governance : Evaluate,Direct ,Monitor controls objectives

A

Ensure IT benefit delivery
Ensure risk realization
Ensure resource optimization

The only IT governance focused domain in COBIT 2019

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Whats is Management: Align,Plan and Organize control objectives

A

manage data , security and risk

Dress the way IT is used to meet organizational objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Management : Build, acquire and implement control objectives

A

manage changes , asset and project

Where the management assesses IT requirement , acquire the tech and implement them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is : Management: Deliver, service and support control objectives

A

manage operation
manage continuity
manage security services

operational side of IT (IT support)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Management: Monitor, evaluate and assess control objectives

A

manage system of internal control,assurance
Focus on existing IT and if they meet the organization objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does logical access controls do

A

identify ,authorize and provide users access to a computer info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does physical access controls do

A

help to keep track of who coming and going into the facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Role based access control (RBAC) is to

A

restricted network for individual with specific roles that have a criteria if they acess the system or not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

User access roles are

A

groups with predefined permission to which users are assigned , with each user assigned to only one role at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the hierarchy of user roles

A

Administrator
Creator
User
Read-only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Whats user authentification

A

process associating the username to each authorized user with unique identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Whats user access provisioning

A

formal process of granting access to a new user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What user access de-provisionning

A

formal process of changing users access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the two type of user access changes

A

Termination
Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Dormant access

A

user has not accessed the system for significant period of time but still has an active role that grant them access

20
Q

What are some control activities in logical security

A

Policies and procedures for suer access are documented
access to system is granted to each user based on the user business need
user access to systems is periodically reviewed for appropriateness
New access request are reviews and approved before being granted

21
Q

Why do company used data center

A

to protect the physical component on which the systems and data are stored

22
Q

What are the three keys environment of data center

A

Outside environment
Inside environment
Physical security

23
Q

Whats is Business continuity planning

A

set of procedures that the business take to protect employees , stakeholders and assts in a disruptive events

24
Q

Whats is business continuity planning subset

A

Disaster recovery

25
Q

Explain a back up site

A

a physical location where company personnel will go to recover the systems and data after a disaster

26
Q

whats a hot backup site

A

it’s immedaitely operational after a disater, the most expensive option

27
Q

Whats a warm backup site

A

equipped with servers ready for systems to be installed and contains only some equipment needed to ramp up the operations. It might take couple hours to warm a backup site the cost of maintaining is less.

28
Q

Whats a cold backup site

A

is an empty room with no servers or equipment ready, the recovering takes a few days and weeks

29
Q

When disasters strikes what are the 2 metrics

A

recovery time objective adn recovery point objective

30
Q

Explain recovery time objective (RTO)

A

How much time systems can be down before it cause significant damage to the business

31
Q

Recovery point objective ( RPO) :

A

How much data can be loss before it cause significant damage to the business

32
Q

Whats a backup strategy

A

determine which data is being stored during data backup

33
Q

Whats are the basic types of backup strategies

A

full
differential
incremental

34
Q

Explain full backup strategies

A

the slowest methods , require a lot of store as it involves copying all existing data in it entirety every time

35
Q

Explain differential backup strategies

A

this take moderate amount of time and storage space as it involve copying all data created since the most recent full backup every time

36
Q

Eplain incremental backup strategies

A

This is the cheapest strategy as it involves copying only new or uptated data with each backup

37
Q

Whats a backup cycle

A

determine when data is being stored during a data backup

38
Q

What is the most common backup cycles

A

grandfather-father-son redundant backup

39
Q

Grandfather cycle is based

A

on full backup once a months

40
Q

Father cycle is based

A

on full backup once a week

41
Q

Son cycle is based

A

Incremental or. differential backup , every day

42
Q

Whats the change management process

A

a standardized process that decree risk by controlling the identification and implementation of required changes to a systems

43
Q

What are the three steps of change management process

A

test environment
model environment
production environment

44
Q

test environment is

A

is when developers can play without having any impact on the system

45
Q

Model environment is

A

a recent copy of the live system which is used to implement the code in a environment that looks almost like production

46
Q

Production environment is

A

the systems goes live and available for ends users