Chapters 8 - IT CISI

?
Who manages all other staff in the IT Department and sets the IT Strategy?
CIO (Chief Information Officer) - board level
1 of 38
What is the Head of Production & Support responsible for?
Provision of all servers and desktop fascilities to all users & day-to-day running and support of the production/ live systems
2 of 38
Who reports under the Head of Production Support?
Database Admins (DBAs) & Help Desk Analysts
3 of 38
Who is in charge of reviewing SQL performence and tuning, developing & enforcing database standards, and reviewing back-up and recovery strategies?
Database Admins (DBAs)
4 of 38
What is meant by the term "thin client"?
Laptop or PC running on an internet browser only.
5 of 38
What is meant by the term "fat client"?
PC on which an application other than a browser is installed
6 of 38
What is meant by the term "logic engine" or "business rules"?
A component which holds the rules for the system (eg validating trades, creating customers, etc)
7 of 38
What is a rational database?
A database containing a number of tables and relationships between them (table = data item, eg transactions).Each ROW represents a "specific" actual data item vs COLUMNS represent "individual" data item eg name & address
8 of 38
What is the standard method to interface with rational database?
SQL - obtains, inserts, deletes or updates rows from tables.
9 of 38
What software products can be purchased to allow non-technical users to develop reports over a database without using SQL?
ORACLE, IBM's DB2, Sybase, Microsoft SQL server, MY SQL
10 of 38
Where will many mission critical systems be deployed in?
Distributed System
11 of 38
What is a distributed system?
A configuration which contains a number of hardware elements that are connected by some transmission technology
12 of 38
What is Data replication?
Sharing information to ensure consistency between redundant resources. Implemented by storing the same data on multiple devices.
13 of 38
In what situation would the governance structures of 'business as usual' and 'business change' work closely together?
If there is a critical issue with production and a business change is required immediately, or during major deployment activities.
14 of 38
What is the definition of scope expansion risk in business change?
The scope grows and grows - unable to keep up
15 of 38
What are the 3 main providers of anti-virus software?
Norton, McAfee, Kaspesky
16 of 38
What Prevention and Detection Technique is this - "Identifies vulnurable points in the network that can easily be accessed by both external and internal users. Test must be done from internal & external perspectives. Specialist Organisations can be deplo
Attack & Penetration Testing
17 of 38
How to firewalls detect and prevent cyber-crime?
control incoming and outgoing network traffic by analysing data packets and allowing / blocking them through based on the rules set.
18 of 38
How does Impact Analysis help to detect cyber-crime?
By establishing which systems are most likely to be attacked and the likely consequences. Efforts concentration on those with highest risk and severity.
19 of 38
What type of cyber-crime attack is one where it attempts to make a machine or network resource unavailable to its intended users? Usually by bombarding the host with very large number of requests which creates business disruption?
DDoS
20 of 38
What is a cyber-attack called which steals valuable and confidential information about products, services, patents etc?
Cyber-espionage
21 of 38
What is a computer virus called which appears to be a legitimate program but results in unauthorized access to the victim's files? Hides as something desirable so users willingly install it.
Trojan Virus
22 of 38
What is Botnet?
Network of computers controlled by cyber-criminals using a Trojan.
23 of 38
A disaster Recovery Plan is a Comprehensive statement of consistent actions to be taken:
Before, During, and After a disaster
24 of 38
What is the primary objective of Disaster Recovery Plan?
to protect the organisation in the event that all (or part) of its operations are rendered unusable.
25 of 38
What is Disaster Recovery?
Process of regaining access to data & software needed to resume critical business operations after a natural or human-induced disaster.
26 of 38
What parts of the business should the Planning Committee risk assess with regards to Disaster Recovery?
All functional Areas
27 of 38
What is a Cold Site?
a cold standby server at a standby location that is configured SIMILARLY to the primary server and is running the SAME version of the operating system
28 of 38
Implementing automated procedures to maintain same data on 2 servers in DIFFERENT locations (backing up, copying and restoring the database) is a form of which Recovery Strategy?
Warm Site
29 of 38
An approach to maintain system availability by routinely writing transactions to the production server and the standby server at different locations simultaneously. Standby server ready to take over the processing load immediately.
Hot Site
30 of 38
Who has responsibility over overseeing, documenting and montiroing the Recovery Process?
Management Team
31 of 38
What is the last stage of the Disaster Recovery Plan ?
Approval by senior managers
32 of 38
A firm is conducting business in a single time zone but is using apps that are working throughout the day and night. What Support is most suitable for them?
"Extended Working Hours"
33 of 38
What would be an example of " an unplanned emergency activity?
An item of hardware / app is not performing correctly & requires fixing
34 of 38
When an issue requires a software enhancement, who will MAKE the changes?
The Developer
35 of 38
When an issue requires a software enhancement, who will decide WHAT the change will need to be?
The Business Analyst
36 of 38
What are Version Control Systems (VCSs)?
Software apps that manage multiple revisions of the same unit of information. They prevent more than 1 developer working on a change to a program at the same time, and ensure an audit trial of who is modifying, and ensure mods are being made to the right
37 of 38
Who usually attends Change Control Meetings?
Representatives of all the business areas affected
38 of 38

Other cards in this set

Card 2

Front

What is the Head of Production & Support responsible for?

Back

Provision of all servers and desktop fascilities to all users & day-to-day running and support of the production/ live systems

Card 3

Front

Who reports under the Head of Production Support?

Back

Preview of the front of card 3

Card 4

Front

Who is in charge of reviewing SQL performence and tuning, developing & enforcing database standards, and reviewing back-up and recovery strategies?

Back

Preview of the front of card 4

Card 5

Front

What is meant by the term "thin client"?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Accounting resources:

See all Accounting resources »See all CISI IT resources »