Final Exam Flashcards

(87 cards)

1
Q

IT architecture

A

The IT Infrastructure is basically a standardized set of products, that we connect together into a network that then supports our IT Application Landscape, and that IT Application Landscape creates a set of Business Capabilities, and those Business Capabilities support our Business Model (value for customer).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IT architecture provides

A

Standardization & consistency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IT architecture components

A

Software, hardware, network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IT architecture model

A

Customer value needs -> business capabilities -> IT app landscape -> App architecture -> integration platform -> Infrastructure products -> network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IT Application Architecture

A

Layered logical design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Layered logical design

A

The application is structured into multiple layers so the different tasks that need to be done are logically grouped together based on what they do for the application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sub layers

A

Logical layers are split into sub layers that perform very specific tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is Business Model a component of IT architecture?

A

Business model is NOT a component of the IT architecture, however, the IT architecture is in place to support the business model (or creating value for customers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is standardization?

A
  • We need to actually be able to support all of the software running so standardizing infrastructure products (becoming standard IT infrastructure) is key
  • The reason to have this structured process is everything ultimately supports our business model or how we create value for our customers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does IT architecture provide consistency?

A

IT architecture provides consistency by defining a standardized set of infrastructure products, all the infrastructure products will work seamlessly to enable business capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logical design support Reusability how?

A

The logical grouping (logical layers) groups similar app tasks together. These components once created can be reused. Then we don’t need to reinvent capabilities of an application over and over again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Presentation Layer

A
  • First layer

- Users interact with this layer, manages interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Business Layer

A
  • Second Layer

- implements the core functionality of the system, and encapsulates the relevant business logic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Layer

A
  • Third layer

- The Data Layer exposes generic interfaces that the components in the business layer can consume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Services Layer

A
  • This layer provides services to external systems

- When external clients need support from an application directly, this layer provides an alternative view

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Physical Layer

A
  • The physical layer consists of tiers. Tiers describe the physical distribution of the functionality and components on separate servers, computers, networks, or remote locations.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

heart beat signal

A

a periodic signal generated by hardware or software to indicate normal operation or to synchronize other parts of a computer system. Usually a heartbeat is sent between machines at a regular interval in the order of seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

presentation layer components

A

Presentation logic, UI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

business layer components

A

Application Façade, Workflow, Business components, business entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

data layer components

A

Data Access components, Data Utilities, Service Agents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

when is a services layer needed

A

To be able to push data out to external systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

how does the services layer communicate

A

A service-based solution can be seen as being composed of multiple services, each communicating with the others by passing messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

n-tier architecture

A

The functionality of a system can be distributed amongst many different systems in the n-tier architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Mapping layers to tiers

A

Tiers to layers are 1:1, there is a presentation tier, business tier. Etc. It is possible to locate more than one layer on the same tier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
heartbeat signal
A heartbeat is a periodic signal generated by hardware or software to indicate normal operation or to synchronize other parts of a computer system. Usually a heartbeat is sent between machines at a regular interval in the order of seconds; a heartbeat signal, The failover cluster switches from active to passive server by using heartbeat signal.
26
middleware
Is software that provides common services and capabilities to applications outside of what's offered by the operating system aka software Glue
27
why is middleware used
- In theory, C/S Architectures allow hardware and software from any vendor to be used together, however, this is rarely true in practice - A standard way of translating between software from different vendors is achieved by using middleware
28
failover cluster
A failover cluster is a set of servers that are configured in such a way that if one server becomes unavailable, another server automatically takes over for the failed server and continues processing
29
when is failover clustering used
Failover clustering is typically used with database servers.
30
why use failover clustering
A distribution pattern that provides a highly available infrastructure tier to protect against loss of service due to the failure of a single server or the software that it hosts
31
Process for designing applications
When designing an application, the first task is to Focus on the highest level of abstraction and start by grouping functionality into layers.
32
Two types of backbone networks
routed backbones and virtual LANs
33
Advantage of routed backbones
The main advantage is LAN segmentation
34
How do virtual LANs assign LAN segments
Software
35
Virtualization
is software that mimics & simulates hardware, enabling virtual CPU, memory, storage, networking, etc. to create a virtualized hardware layer.
36
On top of virtual software
OS and apps can be installed.
37
Below virtual software
The actual hardware layer
38
virtual machine
a virtual computer that is running on top of virtualized hardware
39
How to duplicate VMs
With virtualization, the entire operating system and application environment is stored on a virtual disk, which can be easily duplicated to create new VMs
40
Can you add storage through virtualization
By virtualization you CANNOT add more storage space than underlying hardware. You are limited to the hardware minus the overhead of virtualization.
41
Can you add processing and memory resources through virtualization
Servers using full virtualization CANNOT use more of the computer’s processing and memory resources than is physically installed on the computer
42
What can be created with virtualization?
USB Key, Storage, Network Interface Card
43
building block of cloud computing
virtualization
44
Are VMs highly portable?
Virtual machines are highly portable, allowing IT to quickly migrate them between physical machines
45
Solution for OS incompatibility
Desktop virtualization can enable the use of applications that only run on an older version of an OS when the user’s desktop is running a newer version
46
Bare metal virtualization architecture
Hypervisor directly on the hardware, guest OS in the VMs
47
Hosted Virtualization Architecture
Requires the use of a Host Operating System
48
SaaS
application software that’s hosted in the cloud and that you access and use via a web browser, a dedicated desktop client, or an API that integrates with your desktop or mobile operating system
49
SaaS Consumer Control
The consumer does not manage or control the underlying cloud infrastructure, with the possible exception of limited user-specific application configuration settings
50
Is logical isolation between clients possible in SaaS?
Yes
51
In SaaS does the provider provide a unique execution environment for each customer for the same application?
No
52
SaaS example
salesforce.com
53
PaaS
- As a service delivery of tools for development, deployment, hosting and application maintenance - Provides on-demand platform—hardware, complete software stack, infrastructure, and even development tools—for running, developing, and managing applications without the cost, complexity, and inflexibility of maintaining that platform on-premises
54
PaaS Consumer Control
- the deployed applications and possibly configuration settings for the application-hosting environment. - the settings of deployed applications
55
PaaS Provider Control
``` hosts everything (hardware) at their data center the underlying cloud infrastructure storage and networking components. ```
56
How does PaaS work?
Developers pick from a menu to ‘spin up’ servers and environments they need to run, build, test, deploy, maintain, update, and scale applications
57
PaaS example
Google App Engine
58
IaaS
- As a service delivery of virtual CPUs, disk space, and database servers - The capability provided to the consumer is to provision processing, storage, networks, etc where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications
59
IaaS Consumer Control
operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).
60
IaaS Provider Control
underlying cloud infrastructure
61
IaaS example
AWS
62
IaaS advantage
Resource Wastage eliminated
63
iPaaS
Cloud based Integration platform as a service. Allows applications that reside on the cloud or on-prem to integrate and have data flow freely between them.
64
iPaaS example
Boomi
65
Private Cloud
The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple business units
66
Private cloud premise
It may be owned, managed, and operated by the organization, a third party, or some combo of them, and it may exist on or off-premises
67
Private cloud benefits
Security and control benefits make it feasible for orgs with compliance concerns such as HIPAA Compliant Hosting and PCI
68
Public Cloud
provisioned for open use by the general public
69
public cloud premise
Exists on the premises of the cloud provider
70
Public cloud benefits
cost effective, scalable, user-friendly and reliable benefits
71
Community Cloud
provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns
72
Hybrid Cloud
2 or more distinct cloud infrastructures that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability
73
Change control
formalized organizational process requiring every change to a production network or server being reviewed and approved or rejected. Works in tandem with configuration management.
74
Change control benefits
Forces updated documentation enables tracking and auditing Maintains system integrity
75
COBIT
A governance framework by ISACA for guiding IT processes to be structured and driven by widely adopted proven ways of managing IT. 40 governance objectives.
76
COSO ERM
framework is widely accepted risk management standards that organizations use to help manage risks
77
Five components of COSO ERM
control environment, risk assessment, information and communication, monitoring activities, and existing control activities
78
ISO 2700
International Organization for Standardization series providing recommendations for establishing, implementing, operating, monitoring, reviewing, maintaining, and improving an Information Security Management System
79
ISO 2700 certification benefit
Compliance with ISO standards enables certification for companies giving clients more assurance their data is safe
80
ITL4
- Set of detailed practices for IT service management focused on aligning IT services with business needs - Provides guidance on how to use IT as a tool to facilitate business change, transformation and growth - Advocates IT and digital services are aligned to the business needs and support its core objectives and goals
81
Benefits of layered approach
Layers in a logical design support reusability of components. This enables many advantages during implementation including modularity, simplicity, maintainability, flexibility, and scalability. It is also designed to maximize performance.
82
Cloud computing definition
on-demand access, via the internet, to computing resources—applications, servers (physical & virtual), data storage, development tools, networking capabilities, and more—hosted at a remote data center managed by a CSP.
83
NIST Cloud computing definition
a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing that can be rapidly provisioned and released with minimal management effort or service provider interaction.
84
Cloud Framework 5 Essential Characteristics
``` Broad network access Resource pooling Rapid elasticity On-demand self-service Measured service ```
85
4 Benefits of a layered approach
1. Reusability - dont need to reinvent capabilities 2. Makes it easier to go from design to actual implementation 3. Advantages during implementation - modularity, simplicity, maintainability, flexibility, scalability 4. Maximize performance
86
6 threats to cloud security
``` Data loss and leakage Account service & traffic hijaking Malicious insider Misconfiguration of security settings and buckets Insecure APIs Shared technology vulnerabilities ```
87
4 ways to protect cloud
Firewalls Network segmentation CDN provider Multi region & vendor