ISDS 4120 Exam 3 Flashcards Preview

ISDS 4120 > ISDS 4120 Exam 3 > Flashcards

Flashcards in ISDS 4120 Exam 3 Deck (56):
1

What is Point-of-Presence? (PoP)

-location where an ISP provides service to its customers
-connects to the rest of the ISP's network
-authentication is performed at the PoP

2

What separates telephone from data traffic?

-line splitter
-main distribution facility (MDF)

3

What type of server is used by ISPs to authenticate customers?

-remote-access server

4

What is hybrid fiber coax?

-tv industry term for broadband network that combines optical fiber and coaxial cable

5

Hierarchy of ISPs by size?

-tier 1 National
-tier 2 Regional
-tier 3 Local

6

How does tiering work for ISPs?

-higher-tier ISPs charge lower-tier ISPs for data transfer
-ISPs at same tier don't charge each other (peering)

7

What is used to combine internet data traffic with tv video traffic in a cable modem environment?

-combiner

8

Combiner

-combines the internet data traffic with the ordinary tv video traffic and sends it back to the fiber node for distribution

9

What is an Internet Exchange Point (IEP)?

-physical infrastructure through which ISPs and content delivery networks exchange internet traffic between their networks
-autonomous system

10

What is Internet 2?

-US National Science Foundation Project started in 1996
-used by more than 500 organizations to develop advanced networks and network management tools

11

What is Peering?

-ISPs do not charge 1 another for transferring messages they exchange across a NAP or MAE

12

Scalability

-allows for traffic spikes and minimizes delays

13

Elasticity

-allows for workload changes by provisioning and de-provisioning resources in an autonomic manner, such that at each point in time the available resources match the current demand as closely as possible

14

Resiliency

-mirrored solutions to minimize downtime in the event of a disaster, gives business sustainability they need during unanticipated events

15

Homogeneity

-no matter which cloud provider and architecture an organization uses, an open cloud will make it easy for them to work with other groups, even if those other groups choose different providers and architectures

16

Multi-tenancy

-different companies share the same machine

17

Single-tenancy

all users in the same company use the same machine

18

Advantages of a Virtual Machine (6)

-run operating systems where physical hardware is unavailable
-easier to create new machines and backup machines
-software testing using clean installs of operating systems and software
-emulate more machines than are physically available
-debug problems
-run legacy systems

19

Advantages of Cloud Computing? (7)

-lower computer costs
-improved performance
-reduced software costs
-instant software updates
-unlimited storage capacity
-increased data reliability
-universal document access

20

Benefits of Cloud Computing?

-significant cost saving
-high performance
-very flexible

21

Costs of Cloud Computing?

-lack of transparency
-sharing of computer assets

22

Vendo Value Proposition?

-personnel development, methodology development, and customer relationship management + complementarities in core competencies = productivity gains available to the client

23

2 Beneficial relationships

-client-vender relationship
-partnership quality

24

Client-Vender Relationship solidified with

-contract
-performance measurement
-service level agreement

25

Partnership Quality

-trust
-business understanding
-benefit/risk share
-conflict avoidance
-commitment

26

Partnership Quality: Trust

-degree of confidence and willingness

27

Partnership Quality: Business Understanding

-degree of understanding of behaviors, goals, and policies

28

Partnership Quality: Benefit/Risk Share

-degree of articulation and agreement on benefit risk

29

Partnership Quality: Conflict Avoidance

-degree of compatibility of activities, resource share and goals

30

Partnership Quality: Commitment

-degree of the pledge of relationship continuity

31

What laws govern Cloud Computing?

-processing of personal data
-free movement of personal data

32

What risks are associated with Cloud Computing?

-geographic
-data security
-contractual
-architectural

33

Advantages of Cloud Security

-data fragmentation and dispersal
-dedicated security team
-greater investment in security infrastructure
-fault tolerance and reliability
-greater resiliency
-hypervisor protection against network attacks
-possible reduction of C-A activities
-simplification of compliance analysis
-data held unbiased party
-low-cost disaster recovery and data storage solutions
-on-demand security controls
-real-time detection of system tampering
-rapid re-construction of services
-advanced honeynet capabilities

34

Disadvantages of Cloud Security

-data dispersal and international privacy laws
-need for isolation management
-multi-tenacy
-logging challenges
-data ownership issues
-quality of service guarentees
-dependence on secure hypervisors
-attraction to hackers
-security of virtual OS's in the cloud
-possibility of massive outages
-encryption needs
-public cloud vs internal cloud security
-lack of public SaaS version control

35

Worm

-virus spreads itself without human intervention
-copies itself from computer to computer

36

Encryption

-disguising information using math rules, providing confidentiality

37

Trojan Horse

-important tool in gaining unauthorized access
-remote access management console that enable users to access a computer and manage it from afar

38

Disasters: Threats to business continuity

-disruption
-destruction of data
-disasters
-virus
-denial of service
-theft
-device failure
-disaster

39

Intrusion: Threats of Unauthorized Access

-external attackers exist, but most unauthorized access incidents involve employees

40

IT Assets

-mission-critical applications and data

41

IT Threats

-any potential occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss to the organization

42

How do you calculate a Relative Risk Score?

-multiplying the impact score by the likelihood

43

How does a Packet Level Firewall work?

-examines the source destination address of every network packet that passes through it

44

What is Mission Critical Information System?

-an information system that is critical to the survival of the organization

45

What Layer would an IP Security protocol sit on?

-network layer

46

What are the methods for Deterring Intrusion?

-security policy
-physical security
-firewalls
-encryption

47

What are the two parts of a Symmetric Encryption System?

1.) algorithm
2.) key

48

What are the steps in Implementing an Enterprise 2.0 Initiative?

-understand drivers
-create enabling frameworks
-supportive initiatives
-drive adoption and value

49

What are the 6 Characteristics of Web 3.0?

1.) ubiquitous
2.) organized
3.) predictive
4.) mashed-up
5.) behavioral advertising
6.) converge

50

Enterprise 1.0

-bulletin boards
-email
-instant messaging
-discussion forums
-chat rooms
-web/video conferencing
-static-web

51

Enterprise 1.5

-web services
-collaborative filtering
-social networking
-social networking analysis
-agents
-portals/intranets
-dynamic web

52

Enterprise 2.0

-wikis
-blogs
-really simple syndication (RSS)
-mash-ups
-podcasting
-social voting/ranking
-social bookmarking
-social networking

53

What are the characteristics of Web 2.0?

-participation
-standards
-decentralization
-openness
-modularity
-user control
-identity

54

Where do inputs of Web 2.0 technologies arise from?

-user generated content
-opinions
-applications

55

What are the future Grand Challenges of Enterprise Architecture?

-applications
-infrastructure
-processes
-organizational designs
-revenue

56

What one word describes Enterprise 2.0?

-flatness