S2
74 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which action is the first step in managing the risks associated with adding a Cloud Service Provider (CSP)?

  • Integrate governance of CSP with existing risk management policies
  • Define systems and structure provided by CSP
  • Create steering committee (correct)
  • Assess risk of adding CSP

Which of the following scenarios is likely to increase cloud computing risks?

  • Switching from on-premises software to SaaS
  • Migrating from private cloud to public model (correct)
  • Implementing IaaS in a private cloud
  • Utilizing a hybrid cloud model

Which type of processing control involves ensuring that data pricing is accurate and complete throughout the processing stage?

  • Access control
  • Processing control (correct)
  • Output control
  • Input control

Which general control in an information system focuses on maintaining security and compliance?

<p>Security management (B)</p> Signup and view all the answers

What is a benefit of using Enterprise Resource Planning (ERP) systems in an organization?

<p>Supports cross-functional systems effectively (D)</p> Signup and view all the answers

What is the primary advantage of conducting a full backup?

<p>It provides the quickest restoration to functionality. (C)</p> Signup and view all the answers

Which disaster recovery site type incurs the lowest costs?

<p>Cold Site (D)</p> Signup and view all the answers

What does an incremental backup specifically capture?

<p>Only the changes made on the day of the backup. (B)</p> Signup and view all the answers

Which of the following actions is considered the most important in a disaster recovery plan?

<p>Testing the disaster recovery plan. (B)</p> Signup and view all the answers

Which backup method requires more time compared to incremental backups but provides a simpler restoration process?

<p>Differential Backup (B)</p> Signup and view all the answers

What is the primary function of a modem in a network?

<p>Translates analog signals from the internet into digital signals (C)</p> Signup and view all the answers

Which hardware is specifically responsible for managing network traffic by connecting multiple devices?

<p>Router (D)</p> Signup and view all the answers

Which type of firewall analyzes packets to determine if they can be accepted by the firewall's storage?

<p>Basic Packet-Filtering Firewall (D)</p> Signup and view all the answers

What is a major advantage of star topology in network design?

<p>Easy identification of damaged cables (C)</p> Signup and view all the answers

Which device acts as an intermediary between different networks and translates protocols?

<p>Gateway (D)</p> Signup and view all the answers

Which firewalls combine packet-filtering and network address translation?

<p>Stateful Multilayer Inspection Firewalls (D)</p> Signup and view all the answers

What is true about edge-enabled devices in a network?

<p>They allow for faster network response times by decentralizing computing power. (A)</p> Signup and view all the answers

What does the OSI model represent?

<p>A visualization of network functions across seven layers (B)</p> Signup and view all the answers

Which of the following is NOT considered part of internal computer hardware?

<p>Keyboard (D)</p> Signup and view all the answers

Which networking device does NOT assign IP addresses?

<p>Switch (B)</p> Signup and view all the answers

What is the main purpose of change management controls?

<p>To establish policies and procedures for managing change (A)</p> Signup and view all the answers

Which of the following is NOT a type of change environment?

<p>Regulatory (C)</p> Signup and view all the answers

What does the phrase 'baseline configuration' refer to in the context of documenting systems controls?

<p>The initial state of the system before any changes are made (B)</p> Signup and view all the answers

What is the primary benefit of the Agile method in project management?

<p>Increased flexibility and shorter deadlines (A)</p> Signup and view all the answers

Which type of testing is focused on evaluating the smallest unit of an application?

<p>Unit Testing (D)</p> Signup and view all the answers

In the change management process, what step follows gaining approval from management?

<p>Develop budget and timeline (D)</p> Signup and view all the answers

What is meant by 'proactive' patch management?

<p>Identifying weaknesses and applying patches as vulnerabilities arise (B)</p> Signup and view all the answers

What is the purpose of the 'Archival' step in the data lifecycle process?

<p>To transfer data from active systems to passive systems (D)</p> Signup and view all the answers

Which of the following best describes the concept of 'mirroring' in data management?

<p>Duplicating a database onto a machine at the same site (D)</p> Signup and view all the answers

Which of the following is a critical part of logging during change management?

<p>Implementing application logs, change logs, and event logs (A)</p> Signup and view all the answers

What is a significant risk associated with outsourcing in change management?

<p>Potential lack of security from third parties (B)</p> Signup and view all the answers

What is the focus of integration testing in software development?

<p>Ensuring combined modules work together as intended (B)</p> Signup and view all the answers

What does the 'Capture' phase in the data lifecycle process involve?

<p>Retrieving data from existing or external sources (C)</p> Signup and view all the answers

What function does the Presentation Layer (Layer 6) serve in the OSI model?

<p>Transforming data into a suitable format (D)</p> Signup and view all the answers

Which layer of the OSI model is responsible for establishing, maintaining, and terminating sessions?

<p>Session Layer (A)</p> Signup and view all the answers

Which protocol operates at the Transport Layer (Layer 4)?

<p>User Datagram Protocol (UDP) (B)</p> Signup and view all the answers

What does the Data Link Layer (Layer 2) primarily handle?

<p>Adds MAC addresses to packets (A)</p> Signup and view all the answers

Which of the following is NOT a common type of Network Architecture?

<p>Private Local Network (PLN) (B)</p> Signup and view all the answers

What is the primary function of a Cloud Service Provider (CSP)?

<p>Delivering cloud computing services (B)</p> Signup and view all the answers

In the context of cloud computing, what characterizes Software as a Service (SaaS)?

<p>Selling applications to consumers (D)</p> Signup and view all the answers

Which COSO component is focused on prioritizing risks based on organizational objectives?

<p>Performance (B)</p> Signup and view all the answers

What does the acronym CRRIME OIE represent in the COSO Enterprise Risk Management Framework?

<p>Control Activities, Risk Assessment, Risk Response, Information, Monitoring, Event ID (D)</p> Signup and view all the answers

Which deployment model in cloud computing allows resources to be shared among multiple organizations?

<p>Community Cloud (B)</p> Signup and view all the answers

What capability does Platform as a Service (PaaS) provide within cloud computing?

<p>Development of applications and tools (D)</p> Signup and view all the answers

What does the physical layer (Layer 1) primarily accomplish in the OSI model?

<p>Converts data into binary format (B)</p> Signup and view all the answers

Which of the following is a key aspect of the COSO Enterprise Risk Management - Review and Revision component?

<p>Reviewing performance over time (B)</p> Signup and view all the answers

What is a primary characteristic of Mobile Technology?

<p>Combines hardware and software for connectivity (C)</p> Signup and view all the answers

What is the primary purpose of an Operational Data Store (ODS)?

<p>To serve as an interim area for data warehousing. (C)</p> Signup and view all the answers

Which of the following statements best describes a Data Mart?

<p>It focuses on specific departments and tailored data needs. (A)</p> Signup and view all the answers

What does First Normal Form (1NF) require in a relational database?

<p>Each cell must contain only one piece of information. (D)</p> Signup and view all the answers

What is the key distinction between a database model and a database schema?

<p>A model defines the structure while the schema executes the design. (A)</p> Signup and view all the answers

In which type of database key do multiple attributes collaborate to generate a unique identifier?

<p>Composite Primary Key (C)</p> Signup and view all the answers

Which SQL command is used to filter records based on specific criteria?

<p>WHERE (C)</p> Signup and view all the answers

What does a Dimension Table in a database schema provide?

<p>Contextual or descriptive data related to measures. (D)</p> Signup and view all the answers

What is represented by a Start Event in BPMN Activity Models?

<p>The initiation of a specific task. (D)</p> Signup and view all the answers

What is the role of Intermediate Events in BPMN Activity Models?

<p>They indicate changes occurring during a process. (D)</p> Signup and view all the answers

Which of the following best defines a Data Lake?

<p>A location for storing raw data in both structured and unstructured formats. (B)</p> Signup and view all the answers

What type of flow do Sequence Flows represent in BPMN?

<p>The connection of objects within a single pool. (B)</p> Signup and view all the answers

What is the definition of a Data Dictionary in the context of databases?

<p>A reference that provides information about the structure of the database and its data elements. (C)</p> Signup and view all the answers

Which of the following features distinguishes a Snowflake Schema from a Star Schema?

<p>It has a more complex structure with further normalization in dimension tables. (D)</p> Signup and view all the answers

Which system aggregates daily financial information for infrequent events such as mergers and lawsuits?

<p>Financial Reporting System (FRS) (C)</p> Signup and view all the answers

What is the primary goal of the Management Reporting System (MRS)?

<p>To provide internal financial information for daily business problems (A)</p> Signup and view all the answers

In which cycle does a company pay its employees?

<p>Payroll Cycle (C)</p> Signup and view all the answers

What is NOT a function of the Purchasing and Disbursement Cycle?

<p>Recording cash collection (B)</p> Signup and view all the answers

What does the term 'Annualized Loss Expectancy (ALE)' refer to?

<p>Total expected losses over a defined period (C)</p> Signup and view all the answers

Which of the following is NOT a key function of Robotic Process Automation (RPA)?

<p>Interpreting human language (C)</p> Signup and view all the answers

What is the Recovery Point Objective (RPO)?

<p>Threshold for acceptable data loss (B)</p> Signup and view all the answers

What does the acronym COSO stand for in the context of internal controls?

<p>Committee of Sponsoring Organizations of the Treadway Commission (A)</p> Signup and view all the answers

Which phase of Business Impact Analysis (BIA) involves identifying risks?

<p>Identify risks (D)</p> Signup and view all the answers

Which of the following best describes the meaning of 'Maximum Tolerable Downtime (MTD)'?

<p>Time business can tolerate an outage without causing long-term consequences (A)</p> Signup and view all the answers

What type of technology does blockchain primarily represent?

<p>Decentralized control system (A)</p> Signup and view all the answers

Which element is critical for effective crisis management plans?

<p>Unexpected incident preparation (B)</p> Signup and view all the answers

Which function is associated with the General Ledger and Reporting system?

<p>Updates GL continuously (D)</p> Signup and view all the answers

Which accounting cycle is responsible for buying and paying for goods and services?

<p>Purchasing and Disbursement Cycle (B)</p> Signup and view all the answers

Flashcards

Computer Hardware

The physical components of a computer system, including internal components, external peripheral devices, and network infrastructure hardware.

End-User Devices

Devices like laptops, desktops, tablets, and wearables that directly interact with users.

Microprocessor

The brain of a computer, responsible for processing instructions and data.

Hard Drive

Permanent storage for data within a computer, like documents, programs, and operating systems.

Signup and view all the flashcards

RAM (Random Access Memory)

Temporary storage for active data while a computer is running.

Signup and view all the flashcards

Modem

A device that connects a computer to the internet, translating analog signals from the internet to digital signals for the computer.

Signup and view all the flashcards

Router

A device that manages network traffic, connecting devices to form a network. It routes data packets and assigns IP addresses.

Signup and view all the flashcards

Switch

A device that connects multiple network devices and forwards data packets only to the intended recipient.

Signup and view all the flashcards

Network Security

A barrier that prevents unauthorized access to a network, often using firewalls and security protocols.

Signup and view all the flashcards

Network Topology

The way in which data is organized and transmitted across a network. Examples include bus, mesh, ring, and star topologies.

Signup and view all the flashcards

Create Steering Committee

The process of creating a team to oversee the adoption and implementation of cloud services.

Signup and view all the flashcards

Assess Risk of Adding CSP

Assessing the risks associated with moving to a cloud service provider (CSP), considering factors such as vendor reliability, security, and compliance.

Signup and view all the flashcards

Define Systems and Structure

Defining the specific systems and structures that a cloud service provider will offer, such as infrastructure, software, and services.

Signup and view all the flashcards

Integrate CSP Governance

Combining the governance of a cloud service provider with existing risk management policies, ensuring alignment and control.

Signup and view all the flashcards

Reasonableness Test

A test that checks if a transaction amount is reasonable and within expected parameters, raising an error if it deviates significantly from the original amount.

Signup and view all the flashcards

Application Layer

The highest layer of the OSI model, it provides services for applications running on end-user devices. It handles communication protocols like HTTP, FTP, and SMTP.

Signup and view all the flashcards

Presentation Layer

Transforms data into a format that other devices using the OSI model can understand. It also handles encryption and decryption.

Signup and view all the flashcards

Session Layer

Manages communication sessions between devices. Ensures a reliable connection and data exchange.

Signup and view all the flashcards

Transport Layer

Responsible for establishing, managing, and ending communication connections between devices. It ensures reliable data transmission.

Signup and view all the flashcards

Network Layer

Determines the route data packets take between devices, adding addresses for routing. Handles networking protocols like IP and NAT.

Signup and view all the flashcards

Data Link Layer

Prepares data packets for transmission, adding MAC addresses for physical device identification, and handles error detection.

Signup and view all the flashcards

Physical Layer

The lowest layer of the OSI model, responsible for converting data into bits (0s and 1s) for physical transmission over a network.

Signup and view all the flashcards

Local Area Network (LAN)

A network that covers a limited geographical area, typically within a building or home. Examples include a home Wi-Fi network.

Signup and view all the flashcards

Wide-Area Network (WAN)

A network that spans a wide geographical area, connecting multiple locations, cities, or even countries. The internet is a prime example.

Signup and view all the flashcards

Software-Defined WAN (SD-WAN)

A network that uses software to manage traffic and optimize connectivity, providing enhanced security and flexibility.

Signup and view all the flashcards

Virtual Private Network (VPN)

Provides remote and secure access to an existing network, allowing users to connect from anywhere.

Signup and view all the flashcards

Operating System (OS)

The software that controls a computer's basic functions, such as managing hardware, running applications, and providing a user interface.

Signup and view all the flashcards

Firmware

Software that is embedded directly in hardware, controlling the basic functions of a device. Examples include firmware in a router or motherboard.

Signup and view all the flashcards

Cloud Computing

Computing services provided over the internet. Allows users to access and use applications, data, and computing resources remotely.

Signup and view all the flashcards

Infrastructure as a Service (IaaS)

A cloud computing model where users rent computing infrastructure, such as servers, storage, and networking, from a service provider. The user is responsible for managing and running applications.

Signup and view all the flashcards

Platform as a Service (PaaS)

A cloud computing model where users access a platform for developing and deploying applications. Provides tools and services for coding, testing, and running apps.

Signup and view all the flashcards

Disaster Recovery Plan

Assessing the risks of a disaster, identifying mission-critical applications and data, making a plan for handling those applications, determining responsibility, and testing the plan.

Signup and view all the flashcards

Cold Site

A site with no equipment in place, requiring 1-3 days for setup after a disaster. The cheapest option.

Signup and view all the flashcards

Warm Site

A site with equipment present but not operational. Requires 0-3 days to become operational.

Signup and view all the flashcards

Hot Site

A site with fully functioning equipment and operations, immediately ready to use. The most expensive option.

Signup and view all the flashcards

Full Backup

Creating an exact copy of an entire database, taking a lot of time but allowing for the quickest restoration.

Signup and view all the flashcards

What is a Transaction Processing System (TPS)?

Converts economic events into financial transactions. Examples include the sales cycle, conversion cycle, expenditure cycle, and payroll cycle.

Signup and view all the flashcards

What is a Financial Reporting System (FRS)?

Aggregates daily financial information from the TPS and other sources. It is used for infrequent events, like mergers or lawsuits.

Signup and view all the flashcards

What is a Management Reporting System (MRS)?

Provides internal financial information to solve day-to-day business problems. This includes budgeting, variance analysis, and cost-volume profit analysis.

Signup and view all the flashcards

What is one of the goals of AIS subsystems?

Ensuring all transactions are valid and accurately recorded.

Signup and view all the flashcards

What is another goal of AIS subsystems?

Classifying transactions into the correct categories.

Signup and view all the flashcards

What is a third goal of AIS subsystems?

Ensuring transactions are recorded at the correct value.

Signup and view all the flashcards

What is a fourth goal of AIS subsystems?

Recording transactions in the correct accounting period.

Signup and view all the flashcards

What are the steps in the Purchasing and Disbursements Cycle?

A vendor supplies a product, a company submits a purchase order and invoices, the purchasing department pays the vendor, and the purchasing department records the transaction.

Signup and view all the flashcards

What are the steps in the Treasury Cycle?

Management makes decisions on cash and working capital, a bank executes transactions, cash, interest, and investment activity are recorded, and a report is sent to managers.

Signup and view all the flashcards

What are the steps in the Payroll Cycle?

Employees are paid, payment is recorded, and a report is sent to managers.

Signup and view all the flashcards

What are the steps in the Revenue and Collections Cycle?

A customer orders goods, the company sends goods and bills for payment, the customer pays, the company collects the payment and sends it to the bank, the company records sales transactions, and a report is sent to managers.

Signup and view all the flashcards

What are the key AIS functions in the Revenue and Cash Collection Cycle?

Approves or denies credit, records sales invoices, transmits inventory release to the warehouse digitally sends the packing slip to the shipping department, automatically updates with sales information, and closes the invoice, posts to the ledger and updates the customer payment record when paid

Signup and view all the flashcards

What are the key AIS functions in the Purchasing and Disbursement Cycle?

Determines if a vendor is approved, prepares the purchase order, provides a terminal for the receiving department to enter the quantity received into an RR, updates the RR file, reconciles the quantity received, closes the PO, updates the inventory sub-ledger and the GL, provides a terminal for AP to enter an invoice, approves payment, prints and distributes a signed check to the mail room for mailing.

Signup and view all the flashcards

What are the key AIS functions in the HR and Payroll Cycle?

Changes of employment data such as benefits, pay rates, deductions, employment status, new hires, and terminations, allocates labor costs (direct and indirect labor), calculates payroll and produces the payroll register

Signup and view all the flashcards

What are the key AIS functions in the Production Cycle?

Tracks production costs (labor, materials, and overhead), tracks production runs.

Signup and view all the flashcards

What are the key AIS functions in the Fixed Asset Cycle?

Creates a record of PPE (useful life, SV, depreciation, and location), updates the GL, prepares journal entries (JEs), creates a depreciation schedule, calculates depreciation, and calculates the gain/loss when the asset is disposed.

Signup and view all the flashcards

Mirroring (Data Replication)

The process of copying a database onto a machine at the same site. This means you have a backup of your data, ready to go!

Signup and view all the flashcards

Change Management

The policies, procedures, and resources employed to manage changes within an organization. It helps ensure that changes are implemented smoothly and don't disrupt operations.

Signup and view all the flashcards

System Component Inventory

A document that precisely outlines the current state of IT assets. It acts as a blueprint for the IT infrastructure.

Signup and view all the flashcards

Baseline Configuration

The initial state of a system or configuration before any changes are implemented. A baseline provides a starting point for comparison and evaluation.

Signup and view all the flashcards

Acceptance Criteria

Evaluations that assess the quality of a change or system. They typically encompass performance, functionality, scalability, and compliance.

Signup and view all the flashcards

Identify and Define Need for Change

The first stage of the change management process where the need for change is identified and defined. This sets the foundation for all subsequent steps.

Signup and view all the flashcards

Design a High-Level Plan

The stage where a high-level plan is developed for the change. This plan outlines the goals, scope, and major steps involved.

Signup and view all the flashcards

Gain Approval from Management

The stage where the change plan is presented to management for approval. This is a critical step to ensure support and resources are allocated.

Signup and view all the flashcards

Develop Budget and Timeline

The stage where the change plan is translated into specific actions, including resource allocation, timelines, and responsibilities.

Signup and view all the flashcards

Assign Personnel

A phase in the change management process where specific personnel are assigned to carry out tasks related to the change.

Signup and view all the flashcards

Identify and Address Potential Risks

A stage in the change management process that focuses on identifying and mitigating potential risks associated with the change.

Signup and view all the flashcards

Implementation Map

A step in the change management process where a roadmap is created to guide the implementation of the change. This map outlines the sequence and dependencies of tasks.

Signup and view all the flashcards

Test the System Change

The stage where testing is conducted to ensure the system change meets requirements and functions as intended.

Signup and view all the flashcards

Execute Plan and Monitor Change

The final stage where the change is formally implemented and monitored to ensure it is effective and stable.

Signup and view all the flashcards

Necessary Resources and Training

The stage where any necessary resources or training is identified and provided to support the implementation of the change.

Signup and view all the flashcards

Operational Data Store (ODS)

A type of database used as a temporary holding area for data before it's loaded into a data warehouse. It stores information about ongoing business operations.

Signup and view all the flashcards

Data Warehouse

Large, centralized repositories of data used for reporting and analysis. They must be constantly updated to remain relevant.

Signup and view all the flashcards

Data Mart

Similar to a data warehouse, but focused on specific business needs, like marketing. Different departments may have tailored data marts.

Signup and view all the flashcards

Data Lake

A storage system designed to hold both organized and unstructured data in its raw, unprocessed form.

Signup and view all the flashcards

Relational Database

The most common method for storing structured data. It creates a data model and ensures data integrity.

Signup and view all the flashcards

Data Elements in a Relational Database

Tables, records, and fields are fundamental components of relational databases. Data types determine what kind of information can be stored.

Signup and view all the flashcards

Primary Key

A unique identifier for each record within a table, ensuring data integrity and preventing duplication.

Signup and view all the flashcards

Composite Primary Key

Used when no single attribute can uniquely identify a record. It combines multiple attributes to create a unique identifier.

Signup and view all the flashcards

Foreign Key

An attribute in one table that refers to the primary key in another table. It establishes relationships between tables.

Signup and view all the flashcards

Data Dictionary

A comprehensive description of the database structure, including data elements, data types, and relationships.

Signup and view all the flashcards

Normalization of Data

A process to organize data in a relational database to eliminate redundancy, improve data integrity, and enforce business rules.

Signup and view all the flashcards

Data Model

A high-level conceptual representation of data structures, showing the relationships between different data entities.

Signup and view all the flashcards

Database Schema

The actual implementation of a data model in a specific database system, including details like column data types and primary/foreign keys.

Signup and view all the flashcards

Structured Query Language (SQL)

A standardized computer language used to interact with data in relational databases, enabling users to query, insert, update, and delete data.

Signup and view all the flashcards

BPMN Activity Models

A standardized notation for creating business process diagrams, using symbols and rules to depict different elements of a business process.

Signup and view all the flashcards

Data Flow Diagrams

A visual representation of how data flows through a system, illustrating the connections between different processes, data stores, and external entities.

Signup and view all the flashcards

Flowcharts

A visual representation of how documents and information flow through a process, illustrating the steps involved and the order of events.

Signup and view all the flashcards

System Interface Diagram

A diagram illustrating the interaction of logical and physical elements within a system, showing how users and functions interface with the system.

Signup and view all the flashcards

Study Notes

IT Infrastructure

  • Computer Hardware: physical components of computers, including external peripherals (mouse, keyboard, etc.), back-end devices (switches, servers, routers), and end-user devices (laptops, tablets).

  • Internal Hardware: microprocessor (brain), graphics/sound cards, hard drives (permanent storage), RAM (temporary storage), power supply, motherboard.

  • External Peripherals: devices not integrated into the computer, such as monitors, disk drives, memory devices, network cards, speakers, and microphones.

  • Infrastructure Housing: data centers or offices, advanced security systems, ventilation, and climate control.

  • Network Infrastructure Hardware: hardware, software, layout, and topology of network resources for connectivity and communication.

Network Infrastructure

  • Modems: connect computers to the internet, translating analog signals to digital, providing internet access to homes or offices.

  • Routers: manage network traffic, read source packets, route them, assign IP addresses, and connect modems to switches.

  • Switches: divide network connections, route traffic to specific destinations, but cannot assign IP addresses like routers (essentially a more advanced hub).

  • Gateways: act as intermediaries between networks, converting protocols.

  • Proxies: gateways that mediate without protocol translation, often blocking hackers.

  • Protocol: sets of rules for information transmission, like TCP/IP (common internet protocol).

  • Edge-enabled devices: process data near the source, decentralizing power and speeding network response.

  • Servers: master coordination and communication in networks, serving data to clients.

  • Signal Modifiers: increase signal strength for electrical, radio frequency, audio, and optical signals.

  • Firewalls: prevent unauthorized access through physical, software, or combined methods; improve traffic flow.

Types of Firewalls

  • Basic Packet-Filtering Firewalls: analyze network packets to determine if data should pass through the firewall.

  • Circuit-Level Firewall: verify packet source against rules, but don't inspect the packet itself.

  • Application-Level Firewalls: inspect packet data and are resource-intensive.

  • Network Address Translation (NAT) Firewalls: assign single public address to private network masks.

  • Stateful Multilayer Inspection Firewalls: combination of packet filtering and NAT.

  • Next-Generation Firewalls (NGFWs): apply firewall rules to specific applications and users.

Network Topology

  • Bus Topology: linear or tree-like layout, failure of central line disables the entire network.

  • Mesh Topology: numerous connections between nodes, commonly used in wireless networks; high traffic, costly.

  • Ring Topology: circular node connections, minimized collision but slower performance.

  • Star Topology: central hub through which data passes; easy cable damage identification.

OSI Model

  • OSI model: seven-layer model for network function segregation.

  • Layer 7 (Application): interface for applications, including HTTP, FTP, SMTP, and EDI.

  • Layer 6 (Presentation): transforms data, handles encryption using standards like ASCII, JPEG, MPEG.

  • Layer 5 (Session): establishes and maintains sessions between devices, using protocols like SQL, RPC, and NFS.

  • Layer 4 (Transport): controls communication connections (TCP, UDP, SSL, TLS).

  • Layer 3 (Network): adds routing addresses, uses IP, IPSec, NAT, and IGMP.

  • Layer 2 (Data Link): formats data packets (MAC addresses); uses ISDN, PPTP, L2TP, ARP.

  • Layer 1 (Physical): converts messages to bits (0s and 1s) for transmission, using technologies like HSSI and SONET.

Common Network Architectures

  • Local Area Networks (LAN): limited geographic area.

  • Wide Area Networks (WAN): larger geographic area, encompassing multiple offices or the internet.

  • Software-Defined WAN (SD-WAN): manages traffic to optimize connectivity.

  • Virtual Private Network (VPN): remote, secure access to a network.

Operating Systems (OS), Firmware, Mobile Technology, IoT

  • Operating systems (OS): software that supports basic computer functions; e.g., Windows, macOS, iOS.

  • Firmware: embedded software directing motherboard/microprocessor functions; less frequently updated.

  • Mobile technology: wireless enabled devices connecting to the internet; includes laptops, tablets, hotspots, mobile phones, applications, OS, and connectivity via Wi-Fi, Bluetooth, 4G/5G.

  • Internet of Things (IoT): devices like Siri, Alexa, TVs, iHomes; extension of mobile technology, usually connected via Bluetooth or internet.

Cloud Computing

  • Cloud Computing: shared computing resources over the internet (e.g., storage, processing, software).

  • Cloud models:

    • Infrastructure as a Service (IaaS): outsourcing servers, storage, hardware, and networking.
    • Platform as a Service (PaaS): providing tools for application development.
    • Software as a Service (SaaS): selling applications or business process services (e.g., payroll, billing).
  • Cloud deployment models: public, private, hybrid, community.

  • Cloud Service Provider (CSP): third-party providing cloud services.

  • Governance frameworks: Cloud Controls Matrix, COSO Enterprise Risk Management (including SPRIG methodology).

Other Topics

  • Types of Processing Controls: input, output, processing, access controls.

  • General Controls: software acquisition, IT infrastructure, security management, development/operations/maintenance controls.

  • Enterprise Resource Planning (ERP): cross-functional, central data repository systems for various business functions.

  • Accounting Information Systems (AIS): systems used by accountants/financial managers, often a component of an ERP.

  • Reasonableness Test: error check for transaction totals.

  • AIS Subsystems: Transaction Processing Systems (TPS), Financial Reporting System (FRS), and Management Reporting System (MRS).

  • AIS Processes: input, source document processing, journal recording, GL/subsidiary ledger posting, trial balances, adjustments, financial report generation. Cycles include purchasing/disbursement, treasury, payroll, revenue/collection.

  • Application Software Provider (ASP) benefits: lower upfront costs, flexibility, suitable for smaller businesses.

  • Processes driven by IT: automation, shared services, outsourcing, offshore operations (IT, knowledge, business processes, software R&D).

  • Risks in outsourcing: quality, service, productivity, staff turnover, language, security, outsourcer qualifications, labor insecurity.

  • Technology forms of IT systems: Robotic Process Automation (RPA), Natural Language Processing (NLP), neural networks.

  • COSO Principles related to IT: general control over technology, acquisition of quality information, effective communication.

  • Blockchain: decentralized, altered transaction-resistant system.

  • Business Resiliency: continuous operation and quick restoration after events; involves business continuity plans, system availability controls, and crisis management.

  • Business Impact Analysis (BIA): identifies how quickly business units can recover.

  • Recovery Point Objective (RPO) / Recovery Time Objective (RTO): maximum acceptable data loss/inoperability.

  • System Availability Controls: redundancy, backups, UPS systems, infrastructure security, physical controls.

  • Disaster Recovery: specific IT systems restoration after a major outage.

  • Backup Types: full, incremental, differential.

  • Replication vs. Mirroring: replication transfers data to a secondary site; mirroring copies a database to the same site.

  • Change Management: policies, procedures, and resources for change governance.

  • Change Management Process: identifying need, planning, approval, budgeting, personnel assignment, risk identification, implementation, testing, execution, review, monitoring.

  • Documenting System Controls: baseline configuration, inventory system, acceptance criteria.

  • Change Management Controls: policies/procedures, standardized requests, job separation, testing, reversion access.

  • Change Environments: development, testing, staging, production, disaster recovery.

  • Integration Risks: user resistance, management/stakeholder support issues, resource concerns, business disruptions, and lack of system integration.

  • Logging: critical for testing, including application, change, event, firewall, network, proxy logs.

  • Data Collection Types: active, passive.

  • Data Lifecycle: capturing, transforming, synthesizing, analyzing, publishing, archiving, and purging data.

  • Data Collection methods: ETL, active, passive data collection.

  • Data Storage: ODS, data warehouses, data marts, data lakes, Relational databases, Data Elements (tables, attributes, records, fields, data types, keys).

    • Database Keys: primary keys, composite primary keys, foreign keys.
  • Data Dictionary: Information about database structure and elements.

  • Data Normalization: 1NF, 2NF, 3NF, data model types (conceptual, logical, physical), data models (star, snowflake).

  • Structured Query Language(SQL): command structure and examples of SELECT, FROM, JOIN, WHERE, HAVING, GROUP BY

  • Data Flow Diagrams (DFDs) / Flowcharts / System Interface Diagrams: standardized diagrams for process visualization

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on IT infrastructure, including computer hardware, internal and external peripherals, and network components. This quiz covers essential concepts and devices used in modern IT environments.

More Like This

Use Quizgecko on...
Browser
Browser