Domain 4 - IS Operations & Business Resilience Flashcards

1
Q

RFID (radio frequency identification)

A

Uses radio waves to locate tagged assets within a limited radius

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A tag includes:

A

A microchip and an antenna

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

6 activities needed to develop a risk management program

A
  1. Identify assets
  2. Identity threats and vulnerabilities
  3. Impact analysis
  4. Risk prioritization
  5. Control evaluation
  6. Implementation of appropriate controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability reports

A

Indicates time period the computer is operating & available for use ; helps determine downtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hardware error reports

A

Identifies system failures & initiates corrective action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Asset management reports

A

Inventory of assets/network-connected equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Utilization reports

A

Determines level of use of systems; used to predict resource requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

System downtime report

A

Indicates effectiveness of preventative maintenance programs (high downtime= program not effective)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When should preventative maintenance/maintenance functions be performed ?

A

During non-peak times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Source code ; object code

A

Readable by humans ; computers
- controlled best by date&time stamping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Job schedule

A

Program used to run various processes automatically; also automates tape backups and other maintenance
-reduced probability of error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EUCs (end user computing)

A

System where non programmers can create their own applications;

not subject to testing;

documented policy should be available to address risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OS (operating system) architecture

A
  1. Base = computer hardware
  2. Nucleus = basic functions; restricted
  3. System software = process’s that support users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Free software (3)

A

Open source - can be listed, modified, or redistributed as required

Freeware - free but source code cannot be redistributed

Shareware - free for trial period with limited functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to determine unauthorized software

A

Using automated tool - scan entire network to capture list of installed software and compare to approved software list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Registry

A

System settings and parameters set in configuration files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Best method to determine control function within OS

A

Review of parameters setting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which report optimizes configuration of a server ?

A

Server utilization reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Hardware maintenance schedules should be validated against

A

Vendor provided specifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a critical/key component in network management?

A

Change/configuration management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Objective of library control software

A

Provide assurance that program changes are authorized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Capacity management

A

The planning & monitoring of computing/network resources to ensure that the available resources are used efficiently and effectively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Problem management

A

To prevent reoccurrence of an incident by identifying root cause and taking action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Problem management steps (5)

A
  1. Report the exception
  2. Investigate
  3. In-depth analysis
  4. Root cause analysis
  5. Address issues identified
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Incident management

A

Return to normal state as quickly as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Response time reports

A

Network management tool - identifies time taken by system to process an IT query by user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Downtime reports

A

Network management tool - tracks availability telecommunication lines and circuits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Online monitors

A

Network management tools - checks data transmission accuracy and errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Network protocol analyzers

A

Used to monitor packets flowing along a network

30
Q

Simple network management protocol (SNMP)

A

Monitors and controls variables throughout the network, manages configuration, and collects statistics on performance & security

31
Q

Change management steps (4)

A
  1. Approval
  2. Testing
  3. Scheduling
  4. Rollback arrangements
32
Q

Code signing

A

Provides assurance that software code has not been modified after sign off

33
Q

What is a key component of network management

A

Configuration management

34
Q

Patch

A

Code changes

Impact analysis should be tested/conducted before installation of patch

35
Q

Objective of library control software

A

Unauthorized changes/access

36
Q

Best assurance of the effectiveness of device provider controls

A

Independent 3rd party audit report

37
Q

Redundancy

A

Duplication of data

38
Q

Normalization

A

Process of reducing duplicate data

39
Q

Concurrency control

A

Prevent integrity issues during simultaneous updates by multiple users

40
Q

Integrity constraints

A

Allow only valid predefined data to enter the database & prevent out of range data

41
Q

Structured query language

A

Programming language for managing date in a database; helps determine PORTABILITY

42
Q

Table link check

A

Assurance over integrity of database

43
Q

DBA (database administrator) activities

A

-conduct changes in database table
-conduct backup & recovery procedures
-consult on database interfaces

44
Q

DBAs should NOT perform:

A

-activities relating to log capturing & monitoring of dba functions
-end user activities
-security patch updates

45
Q

A database should only be changed using a ___ account

A

DBA

46
Q

Clusters/clustering

A

Allows 2 or more servers to work as a unit so if 1 fails the other takes over

47
Q

Diverse routing

A

Routing traffic through split cable facilities or duplicate cable facilities

48
Q

Alternative routing

A

Routing info via an alternative medium such as copper cables or fiber optics

49
Q

Last mile circuit protection

A

Redundancy for local communication loop

50
Q

Long haul network diversity

A

Redundancy for long distance availability

51
Q

Shadow file processing

A

Duplicate files are maintained at remote site

52
Q

Preparedness test

A

Simulates a system crash &verified in a localized environment

(DRP testing - cost effective)

53
Q

When RTO is low, use a

A

Hot site

54
Q

When RPO is low, use

A

Data mirroring

55
Q

Backup intervals should be aligned with

A

RPO

56
Q

Quality of service (QoS)

A

Optimize network performance by assigning priority to bus apps and end users through allocation of dedicated parts of the bandwidth to specific traffic

57
Q

Protocol analyzers

A

Monitor/record network info

58
Q

Online monitors

A

Measure telecommunications transmission

59
Q

Cyclic redundancy check (CRC)

A

Checks for a block of transmitted data - can detect several errors

60
Q

Switches

A

At a low level of network security and transmit a packet to the device to which it is addressed

61
Q

Hubs

A

Will broadcast all data to all network posts

62
Q

Routers

A

Allows packets to be given or denied a access based on address

63
Q

To ensure proper SoD, developers should be

A

Restricted to development environments only

64
Q

Hardware maintenance programs should be validated against

A

Vendor specifications

65
Q

Service-level management (SLM)

A

Negotiate, document, and manage the services in the manner in which the customer requires those services

66
Q

The use of unshielded twisted pair (UTP) in copper will reduce the likelihood of

A

Crosstalk

67
Q

Most critical elements of DRP

A

1) backup data
2) key contacts

68
Q

Greatest concern for disaster recovery hot site

A

Disk space utilization data is not kept current

69
Q

Commitment and rollback procedures ensure

A

Integrity

70
Q

Load balancing ensures

A

Uninterrupted system availability by distributing traffic across multiple servers

-consistent response time for web applications

71
Q

Disk to disk backup

A

Allowed large quantities of data to be backed up in a short time to without impacting system performance