Podcast
Questions and Answers
Which action is the first step in managing the risks associated with adding a Cloud Service Provider (CSP)?
Which action is the first step in managing the risks associated with adding a Cloud Service Provider (CSP)?
- Integrate governance of CSP with existing risk management policies
- Define systems and structure provided by CSP
- Create steering committee (correct)
- Assess risk of adding CSP
Which of the following scenarios is likely to increase cloud computing risks?
Which of the following scenarios is likely to increase cloud computing risks?
- Switching from on-premises software to SaaS
- Migrating from private cloud to public model (correct)
- Implementing IaaS in a private cloud
- Utilizing a hybrid cloud model
Which type of processing control involves ensuring that data pricing is accurate and complete throughout the processing stage?
Which type of processing control involves ensuring that data pricing is accurate and complete throughout the processing stage?
- Access control
- Processing control (correct)
- Output control
- Input control
Which general control in an information system focuses on maintaining security and compliance?
Which general control in an information system focuses on maintaining security and compliance?
What is a benefit of using Enterprise Resource Planning (ERP) systems in an organization?
What is a benefit of using Enterprise Resource Planning (ERP) systems in an organization?
What is the primary advantage of conducting a full backup?
What is the primary advantage of conducting a full backup?
Which disaster recovery site type incurs the lowest costs?
Which disaster recovery site type incurs the lowest costs?
What does an incremental backup specifically capture?
What does an incremental backup specifically capture?
Which of the following actions is considered the most important in a disaster recovery plan?
Which of the following actions is considered the most important in a disaster recovery plan?
Which backup method requires more time compared to incremental backups but provides a simpler restoration process?
Which backup method requires more time compared to incremental backups but provides a simpler restoration process?
What is the primary function of a modem in a network?
What is the primary function of a modem in a network?
Which hardware is specifically responsible for managing network traffic by connecting multiple devices?
Which hardware is specifically responsible for managing network traffic by connecting multiple devices?
Which type of firewall analyzes packets to determine if they can be accepted by the firewall's storage?
Which type of firewall analyzes packets to determine if they can be accepted by the firewall's storage?
What is a major advantage of star topology in network design?
What is a major advantage of star topology in network design?
Which device acts as an intermediary between different networks and translates protocols?
Which device acts as an intermediary between different networks and translates protocols?
Which firewalls combine packet-filtering and network address translation?
Which firewalls combine packet-filtering and network address translation?
What is true about edge-enabled devices in a network?
What is true about edge-enabled devices in a network?
What does the OSI model represent?
What does the OSI model represent?
Which of the following is NOT considered part of internal computer hardware?
Which of the following is NOT considered part of internal computer hardware?
Which networking device does NOT assign IP addresses?
Which networking device does NOT assign IP addresses?
What is the main purpose of change management controls?
What is the main purpose of change management controls?
Which of the following is NOT a type of change environment?
Which of the following is NOT a type of change environment?
What does the phrase 'baseline configuration' refer to in the context of documenting systems controls?
What does the phrase 'baseline configuration' refer to in the context of documenting systems controls?
What is the primary benefit of the Agile method in project management?
What is the primary benefit of the Agile method in project management?
Which type of testing is focused on evaluating the smallest unit of an application?
Which type of testing is focused on evaluating the smallest unit of an application?
In the change management process, what step follows gaining approval from management?
In the change management process, what step follows gaining approval from management?
What is meant by 'proactive' patch management?
What is meant by 'proactive' patch management?
What is the purpose of the 'Archival' step in the data lifecycle process?
What is the purpose of the 'Archival' step in the data lifecycle process?
Which of the following best describes the concept of 'mirroring' in data management?
Which of the following best describes the concept of 'mirroring' in data management?
Which of the following is a critical part of logging during change management?
Which of the following is a critical part of logging during change management?
What is a significant risk associated with outsourcing in change management?
What is a significant risk associated with outsourcing in change management?
What is the focus of integration testing in software development?
What is the focus of integration testing in software development?
What does the 'Capture' phase in the data lifecycle process involve?
What does the 'Capture' phase in the data lifecycle process involve?
What function does the Presentation Layer (Layer 6) serve in the OSI model?
What function does the Presentation Layer (Layer 6) serve in the OSI model?
Which layer of the OSI model is responsible for establishing, maintaining, and terminating sessions?
Which layer of the OSI model is responsible for establishing, maintaining, and terminating sessions?
Which protocol operates at the Transport Layer (Layer 4)?
Which protocol operates at the Transport Layer (Layer 4)?
What does the Data Link Layer (Layer 2) primarily handle?
What does the Data Link Layer (Layer 2) primarily handle?
Which of the following is NOT a common type of Network Architecture?
Which of the following is NOT a common type of Network Architecture?
What is the primary function of a Cloud Service Provider (CSP)?
What is the primary function of a Cloud Service Provider (CSP)?
In the context of cloud computing, what characterizes Software as a Service (SaaS)?
In the context of cloud computing, what characterizes Software as a Service (SaaS)?
Which COSO component is focused on prioritizing risks based on organizational objectives?
Which COSO component is focused on prioritizing risks based on organizational objectives?
What does the acronym CRRIME OIE represent in the COSO Enterprise Risk Management Framework?
What does the acronym CRRIME OIE represent in the COSO Enterprise Risk Management Framework?
Which deployment model in cloud computing allows resources to be shared among multiple organizations?
Which deployment model in cloud computing allows resources to be shared among multiple organizations?
What capability does Platform as a Service (PaaS) provide within cloud computing?
What capability does Platform as a Service (PaaS) provide within cloud computing?
What does the physical layer (Layer 1) primarily accomplish in the OSI model?
What does the physical layer (Layer 1) primarily accomplish in the OSI model?
Which of the following is a key aspect of the COSO Enterprise Risk Management - Review and Revision component?
Which of the following is a key aspect of the COSO Enterprise Risk Management - Review and Revision component?
What is a primary characteristic of Mobile Technology?
What is a primary characteristic of Mobile Technology?
What is the primary purpose of an Operational Data Store (ODS)?
What is the primary purpose of an Operational Data Store (ODS)?
Which of the following statements best describes a Data Mart?
Which of the following statements best describes a Data Mart?
What does First Normal Form (1NF) require in a relational database?
What does First Normal Form (1NF) require in a relational database?
What is the key distinction between a database model and a database schema?
What is the key distinction between a database model and a database schema?
In which type of database key do multiple attributes collaborate to generate a unique identifier?
In which type of database key do multiple attributes collaborate to generate a unique identifier?
Which SQL command is used to filter records based on specific criteria?
Which SQL command is used to filter records based on specific criteria?
What does a Dimension Table in a database schema provide?
What does a Dimension Table in a database schema provide?
What is represented by a Start Event in BPMN Activity Models?
What is represented by a Start Event in BPMN Activity Models?
What is the role of Intermediate Events in BPMN Activity Models?
What is the role of Intermediate Events in BPMN Activity Models?
Which of the following best defines a Data Lake?
Which of the following best defines a Data Lake?
What type of flow do Sequence Flows represent in BPMN?
What type of flow do Sequence Flows represent in BPMN?
What is the definition of a Data Dictionary in the context of databases?
What is the definition of a Data Dictionary in the context of databases?
Which of the following features distinguishes a Snowflake Schema from a Star Schema?
Which of the following features distinguishes a Snowflake Schema from a Star Schema?
Which system aggregates daily financial information for infrequent events such as mergers and lawsuits?
Which system aggregates daily financial information for infrequent events such as mergers and lawsuits?
What is the primary goal of the Management Reporting System (MRS)?
What is the primary goal of the Management Reporting System (MRS)?
In which cycle does a company pay its employees?
In which cycle does a company pay its employees?
What is NOT a function of the Purchasing and Disbursement Cycle?
What is NOT a function of the Purchasing and Disbursement Cycle?
What does the term 'Annualized Loss Expectancy (ALE)' refer to?
What does the term 'Annualized Loss Expectancy (ALE)' refer to?
Which of the following is NOT a key function of Robotic Process Automation (RPA)?
Which of the following is NOT a key function of Robotic Process Automation (RPA)?
What is the Recovery Point Objective (RPO)?
What is the Recovery Point Objective (RPO)?
What does the acronym COSO stand for in the context of internal controls?
What does the acronym COSO stand for in the context of internal controls?
Which phase of Business Impact Analysis (BIA) involves identifying risks?
Which phase of Business Impact Analysis (BIA) involves identifying risks?
Which of the following best describes the meaning of 'Maximum Tolerable Downtime (MTD)'?
Which of the following best describes the meaning of 'Maximum Tolerable Downtime (MTD)'?
What type of technology does blockchain primarily represent?
What type of technology does blockchain primarily represent?
Which element is critical for effective crisis management plans?
Which element is critical for effective crisis management plans?
Which function is associated with the General Ledger and Reporting system?
Which function is associated with the General Ledger and Reporting system?
Which accounting cycle is responsible for buying and paying for goods and services?
Which accounting cycle is responsible for buying and paying for goods and services?
Flashcards
Computer Hardware
Computer Hardware
The physical components of a computer system, including internal components, external peripheral devices, and network infrastructure hardware.
End-User Devices
End-User Devices
Devices like laptops, desktops, tablets, and wearables that directly interact with users.
Microprocessor
Microprocessor
The brain of a computer, responsible for processing instructions and data.
Hard Drive
Hard Drive
Signup and view all the flashcards
RAM (Random Access Memory)
RAM (Random Access Memory)
Signup and view all the flashcards
Modem
Modem
Signup and view all the flashcards
Router
Router
Signup and view all the flashcards
Switch
Switch
Signup and view all the flashcards
Network Security
Network Security
Signup and view all the flashcards
Network Topology
Network Topology
Signup and view all the flashcards
Create Steering Committee
Create Steering Committee
Signup and view all the flashcards
Assess Risk of Adding CSP
Assess Risk of Adding CSP
Signup and view all the flashcards
Define Systems and Structure
Define Systems and Structure
Signup and view all the flashcards
Integrate CSP Governance
Integrate CSP Governance
Signup and view all the flashcards
Reasonableness Test
Reasonableness Test
Signup and view all the flashcards
Application Layer
Application Layer
Signup and view all the flashcards
Presentation Layer
Presentation Layer
Signup and view all the flashcards
Session Layer
Session Layer
Signup and view all the flashcards
Transport Layer
Transport Layer
Signup and view all the flashcards
Network Layer
Network Layer
Signup and view all the flashcards
Data Link Layer
Data Link Layer
Signup and view all the flashcards
Physical Layer
Physical Layer
Signup and view all the flashcards
Local Area Network (LAN)
Local Area Network (LAN)
Signup and view all the flashcards
Wide-Area Network (WAN)
Wide-Area Network (WAN)
Signup and view all the flashcards
Software-Defined WAN (SD-WAN)
Software-Defined WAN (SD-WAN)
Signup and view all the flashcards
Virtual Private Network (VPN)
Virtual Private Network (VPN)
Signup and view all the flashcards
Operating System (OS)
Operating System (OS)
Signup and view all the flashcards
Firmware
Firmware
Signup and view all the flashcards
Cloud Computing
Cloud Computing
Signup and view all the flashcards
Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS)
Signup and view all the flashcards
Platform as a Service (PaaS)
Platform as a Service (PaaS)
Signup and view all the flashcards
Disaster Recovery Plan
Disaster Recovery Plan
Signup and view all the flashcards
Cold Site
Cold Site
Signup and view all the flashcards
Warm Site
Warm Site
Signup and view all the flashcards
Hot Site
Hot Site
Signup and view all the flashcards
Full Backup
Full Backup
Signup and view all the flashcards
What is a Transaction Processing System (TPS)?
What is a Transaction Processing System (TPS)?
Signup and view all the flashcards
What is a Financial Reporting System (FRS)?
What is a Financial Reporting System (FRS)?
Signup and view all the flashcards
What is a Management Reporting System (MRS)?
What is a Management Reporting System (MRS)?
Signup and view all the flashcards
What is one of the goals of AIS subsystems?
What is one of the goals of AIS subsystems?
Signup and view all the flashcards
What is another goal of AIS subsystems?
What is another goal of AIS subsystems?
Signup and view all the flashcards
What is a third goal of AIS subsystems?
What is a third goal of AIS subsystems?
Signup and view all the flashcards
What is a fourth goal of AIS subsystems?
What is a fourth goal of AIS subsystems?
Signup and view all the flashcards
What are the steps in the Purchasing and Disbursements Cycle?
What are the steps in the Purchasing and Disbursements Cycle?
Signup and view all the flashcards
What are the steps in the Treasury Cycle?
What are the steps in the Treasury Cycle?
Signup and view all the flashcards
What are the steps in the Payroll Cycle?
What are the steps in the Payroll Cycle?
Signup and view all the flashcards
What are the steps in the Revenue and Collections Cycle?
What are the steps in the Revenue and Collections Cycle?
Signup and view all the flashcards
What are the key AIS functions in the Revenue and Cash Collection Cycle?
What are the key AIS functions in the Revenue and Cash Collection Cycle?
Signup and view all the flashcards
What are the key AIS functions in the Purchasing and Disbursement Cycle?
What are the key AIS functions in the Purchasing and Disbursement Cycle?
Signup and view all the flashcards
What are the key AIS functions in the HR and Payroll Cycle?
What are the key AIS functions in the HR and Payroll Cycle?
Signup and view all the flashcards
What are the key AIS functions in the Production Cycle?
What are the key AIS functions in the Production Cycle?
Signup and view all the flashcards
What are the key AIS functions in the Fixed Asset Cycle?
What are the key AIS functions in the Fixed Asset Cycle?
Signup and view all the flashcards
Mirroring (Data Replication)
Mirroring (Data Replication)
Signup and view all the flashcards
Change Management
Change Management
Signup and view all the flashcards
System Component Inventory
System Component Inventory
Signup and view all the flashcards
Baseline Configuration
Baseline Configuration
Signup and view all the flashcards
Acceptance Criteria
Acceptance Criteria
Signup and view all the flashcards
Identify and Define Need for Change
Identify and Define Need for Change
Signup and view all the flashcards
Design a High-Level Plan
Design a High-Level Plan
Signup and view all the flashcards
Gain Approval from Management
Gain Approval from Management
Signup and view all the flashcards
Develop Budget and Timeline
Develop Budget and Timeline
Signup and view all the flashcards
Assign Personnel
Assign Personnel
Signup and view all the flashcards
Identify and Address Potential Risks
Identify and Address Potential Risks
Signup and view all the flashcards
Implementation Map
Implementation Map
Signup and view all the flashcards
Test the System Change
Test the System Change
Signup and view all the flashcards
Execute Plan and Monitor Change
Execute Plan and Monitor Change
Signup and view all the flashcards
Necessary Resources and Training
Necessary Resources and Training
Signup and view all the flashcards
Operational Data Store (ODS)
Operational Data Store (ODS)
Signup and view all the flashcards
Data Warehouse
Data Warehouse
Signup and view all the flashcards
Data Mart
Data Mart
Signup and view all the flashcards
Data Lake
Data Lake
Signup and view all the flashcards
Relational Database
Relational Database
Signup and view all the flashcards
Data Elements in a Relational Database
Data Elements in a Relational Database
Signup and view all the flashcards
Primary Key
Primary Key
Signup and view all the flashcards
Composite Primary Key
Composite Primary Key
Signup and view all the flashcards
Foreign Key
Foreign Key
Signup and view all the flashcards
Data Dictionary
Data Dictionary
Signup and view all the flashcards
Normalization of Data
Normalization of Data
Signup and view all the flashcards
Data Model
Data Model
Signup and view all the flashcards
Database Schema
Database Schema
Signup and view all the flashcards
Structured Query Language (SQL)
Structured Query Language (SQL)
Signup and view all the flashcards
BPMN Activity Models
BPMN Activity Models
Signup and view all the flashcards
Data Flow Diagrams
Data Flow Diagrams
Signup and view all the flashcards
Flowcharts
Flowcharts
Signup and view all the flashcards
System Interface Diagram
System Interface Diagram
Signup and view all the flashcards
Study Notes
IT Infrastructure
-
Computer Hardware: physical components of computers, including external peripherals (mouse, keyboard, etc.), back-end devices (switches, servers, routers), and end-user devices (laptops, tablets).
-
Internal Hardware: microprocessor (brain), graphics/sound cards, hard drives (permanent storage), RAM (temporary storage), power supply, motherboard.
-
External Peripherals: devices not integrated into the computer, such as monitors, disk drives, memory devices, network cards, speakers, and microphones.
-
Infrastructure Housing: data centers or offices, advanced security systems, ventilation, and climate control.
-
Network Infrastructure Hardware: hardware, software, layout, and topology of network resources for connectivity and communication.
Network Infrastructure
-
Modems: connect computers to the internet, translating analog signals to digital, providing internet access to homes or offices.
-
Routers: manage network traffic, read source packets, route them, assign IP addresses, and connect modems to switches.
-
Switches: divide network connections, route traffic to specific destinations, but cannot assign IP addresses like routers (essentially a more advanced hub).
-
Gateways: act as intermediaries between networks, converting protocols.
-
Proxies: gateways that mediate without protocol translation, often blocking hackers.
-
Protocol: sets of rules for information transmission, like TCP/IP (common internet protocol).
-
Edge-enabled devices: process data near the source, decentralizing power and speeding network response.
-
Servers: master coordination and communication in networks, serving data to clients.
-
Signal Modifiers: increase signal strength for electrical, radio frequency, audio, and optical signals.
-
Firewalls: prevent unauthorized access through physical, software, or combined methods; improve traffic flow.
Types of Firewalls
-
Basic Packet-Filtering Firewalls: analyze network packets to determine if data should pass through the firewall.
-
Circuit-Level Firewall: verify packet source against rules, but don't inspect the packet itself.
-
Application-Level Firewalls: inspect packet data and are resource-intensive.
-
Network Address Translation (NAT) Firewalls: assign single public address to private network masks.
-
Stateful Multilayer Inspection Firewalls: combination of packet filtering and NAT.
-
Next-Generation Firewalls (NGFWs): apply firewall rules to specific applications and users.
Network Topology
-
Bus Topology: linear or tree-like layout, failure of central line disables the entire network.
-
Mesh Topology: numerous connections between nodes, commonly used in wireless networks; high traffic, costly.
-
Ring Topology: circular node connections, minimized collision but slower performance.
-
Star Topology: central hub through which data passes; easy cable damage identification.
OSI Model
-
OSI model: seven-layer model for network function segregation.
-
Layer 7 (Application): interface for applications, including HTTP, FTP, SMTP, and EDI.
-
Layer 6 (Presentation): transforms data, handles encryption using standards like ASCII, JPEG, MPEG.
-
Layer 5 (Session): establishes and maintains sessions between devices, using protocols like SQL, RPC, and NFS.
-
Layer 4 (Transport): controls communication connections (TCP, UDP, SSL, TLS).
-
Layer 3 (Network): adds routing addresses, uses IP, IPSec, NAT, and IGMP.
-
Layer 2 (Data Link): formats data packets (MAC addresses); uses ISDN, PPTP, L2TP, ARP.
-
Layer 1 (Physical): converts messages to bits (0s and 1s) for transmission, using technologies like HSSI and SONET.
Common Network Architectures
-
Local Area Networks (LAN): limited geographic area.
-
Wide Area Networks (WAN): larger geographic area, encompassing multiple offices or the internet.
-
Software-Defined WAN (SD-WAN): manages traffic to optimize connectivity.
-
Virtual Private Network (VPN): remote, secure access to a network.
Operating Systems (OS), Firmware, Mobile Technology, IoT
-
Operating systems (OS): software that supports basic computer functions; e.g., Windows, macOS, iOS.
-
Firmware: embedded software directing motherboard/microprocessor functions; less frequently updated.
-
Mobile technology: wireless enabled devices connecting to the internet; includes laptops, tablets, hotspots, mobile phones, applications, OS, and connectivity via Wi-Fi, Bluetooth, 4G/5G.
-
Internet of Things (IoT): devices like Siri, Alexa, TVs, iHomes; extension of mobile technology, usually connected via Bluetooth or internet.
Cloud Computing
-
Cloud Computing: shared computing resources over the internet (e.g., storage, processing, software).
-
Cloud models:
- Infrastructure as a Service (IaaS): outsourcing servers, storage, hardware, and networking.
- Platform as a Service (PaaS): providing tools for application development.
- Software as a Service (SaaS): selling applications or business process services (e.g., payroll, billing).
-
Cloud deployment models: public, private, hybrid, community.
-
Cloud Service Provider (CSP): third-party providing cloud services.
-
Governance frameworks: Cloud Controls Matrix, COSO Enterprise Risk Management (including SPRIG methodology).
Other Topics
-
Types of Processing Controls: input, output, processing, access controls.
-
General Controls: software acquisition, IT infrastructure, security management, development/operations/maintenance controls.
-
Enterprise Resource Planning (ERP): cross-functional, central data repository systems for various business functions.
-
Accounting Information Systems (AIS): systems used by accountants/financial managers, often a component of an ERP.
-
Reasonableness Test: error check for transaction totals.
-
AIS Subsystems: Transaction Processing Systems (TPS), Financial Reporting System (FRS), and Management Reporting System (MRS).
-
AIS Processes: input, source document processing, journal recording, GL/subsidiary ledger posting, trial balances, adjustments, financial report generation. Cycles include purchasing/disbursement, treasury, payroll, revenue/collection.
-
Application Software Provider (ASP) benefits: lower upfront costs, flexibility, suitable for smaller businesses.
-
Processes driven by IT: automation, shared services, outsourcing, offshore operations (IT, knowledge, business processes, software R&D).
-
Risks in outsourcing: quality, service, productivity, staff turnover, language, security, outsourcer qualifications, labor insecurity.
-
Technology forms of IT systems: Robotic Process Automation (RPA), Natural Language Processing (NLP), neural networks.
-
COSO Principles related to IT: general control over technology, acquisition of quality information, effective communication.
-
Blockchain: decentralized, altered transaction-resistant system.
-
Business Resiliency: continuous operation and quick restoration after events; involves business continuity plans, system availability controls, and crisis management.
-
Business Impact Analysis (BIA): identifies how quickly business units can recover.
-
Recovery Point Objective (RPO) / Recovery Time Objective (RTO): maximum acceptable data loss/inoperability.
-
System Availability Controls: redundancy, backups, UPS systems, infrastructure security, physical controls.
-
Disaster Recovery: specific IT systems restoration after a major outage.
-
Backup Types: full, incremental, differential.
-
Replication vs. Mirroring: replication transfers data to a secondary site; mirroring copies a database to the same site.
-
Change Management: policies, procedures, and resources for change governance.
-
Change Management Process: identifying need, planning, approval, budgeting, personnel assignment, risk identification, implementation, testing, execution, review, monitoring.
-
Documenting System Controls: baseline configuration, inventory system, acceptance criteria.
-
Change Management Controls: policies/procedures, standardized requests, job separation, testing, reversion access.
-
Change Environments: development, testing, staging, production, disaster recovery.
-
Integration Risks: user resistance, management/stakeholder support issues, resource concerns, business disruptions, and lack of system integration.
-
Logging: critical for testing, including application, change, event, firewall, network, proxy logs.
-
Data Collection Types: active, passive.
-
Data Lifecycle: capturing, transforming, synthesizing, analyzing, publishing, archiving, and purging data.
-
Data Collection methods: ETL, active, passive data collection.
-
Data Storage: ODS, data warehouses, data marts, data lakes, Relational databases, Data Elements (tables, attributes, records, fields, data types, keys).
- Database Keys: primary keys, composite primary keys, foreign keys.
-
Data Dictionary: Information about database structure and elements.
-
Data Normalization: 1NF, 2NF, 3NF, data model types (conceptual, logical, physical), data models (star, snowflake).
-
Structured Query Language(SQL): command structure and examples of SELECT, FROM, JOIN, WHERE, HAVING, GROUP BY
-
Data Flow Diagrams (DFDs) / Flowcharts / System Interface Diagrams: standardized diagrams for process visualization
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on IT infrastructure, including computer hardware, internal and external peripherals, and network components. This quiz covers essential concepts and devices used in modern IT environments.