Podcast
Questions and Answers
Which action is the first step in managing the risks associated with adding a Cloud Service Provider (CSP)?
Which action is the first step in managing the risks associated with adding a Cloud Service Provider (CSP)?
Which of the following scenarios is likely to increase cloud computing risks?
Which of the following scenarios is likely to increase cloud computing risks?
Which type of processing control involves ensuring that data pricing is accurate and complete throughout the processing stage?
Which type of processing control involves ensuring that data pricing is accurate and complete throughout the processing stage?
Which general control in an information system focuses on maintaining security and compliance?
Which general control in an information system focuses on maintaining security and compliance?
Signup and view all the answers
What is a benefit of using Enterprise Resource Planning (ERP) systems in an organization?
What is a benefit of using Enterprise Resource Planning (ERP) systems in an organization?
Signup and view all the answers
What is the primary advantage of conducting a full backup?
What is the primary advantage of conducting a full backup?
Signup and view all the answers
Which disaster recovery site type incurs the lowest costs?
Which disaster recovery site type incurs the lowest costs?
Signup and view all the answers
What does an incremental backup specifically capture?
What does an incremental backup specifically capture?
Signup and view all the answers
Which of the following actions is considered the most important in a disaster recovery plan?
Which of the following actions is considered the most important in a disaster recovery plan?
Signup and view all the answers
Which backup method requires more time compared to incremental backups but provides a simpler restoration process?
Which backup method requires more time compared to incremental backups but provides a simpler restoration process?
Signup and view all the answers
What is the primary function of a modem in a network?
What is the primary function of a modem in a network?
Signup and view all the answers
Which hardware is specifically responsible for managing network traffic by connecting multiple devices?
Which hardware is specifically responsible for managing network traffic by connecting multiple devices?
Signup and view all the answers
Which type of firewall analyzes packets to determine if they can be accepted by the firewall's storage?
Which type of firewall analyzes packets to determine if they can be accepted by the firewall's storage?
Signup and view all the answers
What is a major advantage of star topology in network design?
What is a major advantage of star topology in network design?
Signup and view all the answers
Which device acts as an intermediary between different networks and translates protocols?
Which device acts as an intermediary between different networks and translates protocols?
Signup and view all the answers
Which firewalls combine packet-filtering and network address translation?
Which firewalls combine packet-filtering and network address translation?
Signup and view all the answers
What is true about edge-enabled devices in a network?
What is true about edge-enabled devices in a network?
Signup and view all the answers
What does the OSI model represent?
What does the OSI model represent?
Signup and view all the answers
Which of the following is NOT considered part of internal computer hardware?
Which of the following is NOT considered part of internal computer hardware?
Signup and view all the answers
Which networking device does NOT assign IP addresses?
Which networking device does NOT assign IP addresses?
Signup and view all the answers
What is the main purpose of change management controls?
What is the main purpose of change management controls?
Signup and view all the answers
Which of the following is NOT a type of change environment?
Which of the following is NOT a type of change environment?
Signup and view all the answers
What does the phrase 'baseline configuration' refer to in the context of documenting systems controls?
What does the phrase 'baseline configuration' refer to in the context of documenting systems controls?
Signup and view all the answers
What is the primary benefit of the Agile method in project management?
What is the primary benefit of the Agile method in project management?
Signup and view all the answers
Which type of testing is focused on evaluating the smallest unit of an application?
Which type of testing is focused on evaluating the smallest unit of an application?
Signup and view all the answers
In the change management process, what step follows gaining approval from management?
In the change management process, what step follows gaining approval from management?
Signup and view all the answers
What is meant by 'proactive' patch management?
What is meant by 'proactive' patch management?
Signup and view all the answers
What is the purpose of the 'Archival' step in the data lifecycle process?
What is the purpose of the 'Archival' step in the data lifecycle process?
Signup and view all the answers
Which of the following best describes the concept of 'mirroring' in data management?
Which of the following best describes the concept of 'mirroring' in data management?
Signup and view all the answers
Which of the following is a critical part of logging during change management?
Which of the following is a critical part of logging during change management?
Signup and view all the answers
What is a significant risk associated with outsourcing in change management?
What is a significant risk associated with outsourcing in change management?
Signup and view all the answers
What is the focus of integration testing in software development?
What is the focus of integration testing in software development?
Signup and view all the answers
What does the 'Capture' phase in the data lifecycle process involve?
What does the 'Capture' phase in the data lifecycle process involve?
Signup and view all the answers
What function does the Presentation Layer (Layer 6) serve in the OSI model?
What function does the Presentation Layer (Layer 6) serve in the OSI model?
Signup and view all the answers
Which layer of the OSI model is responsible for establishing, maintaining, and terminating sessions?
Which layer of the OSI model is responsible for establishing, maintaining, and terminating sessions?
Signup and view all the answers
Which protocol operates at the Transport Layer (Layer 4)?
Which protocol operates at the Transport Layer (Layer 4)?
Signup and view all the answers
What does the Data Link Layer (Layer 2) primarily handle?
What does the Data Link Layer (Layer 2) primarily handle?
Signup and view all the answers
Which of the following is NOT a common type of Network Architecture?
Which of the following is NOT a common type of Network Architecture?
Signup and view all the answers
What is the primary function of a Cloud Service Provider (CSP)?
What is the primary function of a Cloud Service Provider (CSP)?
Signup and view all the answers
In the context of cloud computing, what characterizes Software as a Service (SaaS)?
In the context of cloud computing, what characterizes Software as a Service (SaaS)?
Signup and view all the answers
Which COSO component is focused on prioritizing risks based on organizational objectives?
Which COSO component is focused on prioritizing risks based on organizational objectives?
Signup and view all the answers
What does the acronym CRRIME OIE represent in the COSO Enterprise Risk Management Framework?
What does the acronym CRRIME OIE represent in the COSO Enterprise Risk Management Framework?
Signup and view all the answers
Which deployment model in cloud computing allows resources to be shared among multiple organizations?
Which deployment model in cloud computing allows resources to be shared among multiple organizations?
Signup and view all the answers
What capability does Platform as a Service (PaaS) provide within cloud computing?
What capability does Platform as a Service (PaaS) provide within cloud computing?
Signup and view all the answers
What does the physical layer (Layer 1) primarily accomplish in the OSI model?
What does the physical layer (Layer 1) primarily accomplish in the OSI model?
Signup and view all the answers
Which of the following is a key aspect of the COSO Enterprise Risk Management - Review and Revision component?
Which of the following is a key aspect of the COSO Enterprise Risk Management - Review and Revision component?
Signup and view all the answers
What is a primary characteristic of Mobile Technology?
What is a primary characteristic of Mobile Technology?
Signup and view all the answers
What is the primary purpose of an Operational Data Store (ODS)?
What is the primary purpose of an Operational Data Store (ODS)?
Signup and view all the answers
Which of the following statements best describes a Data Mart?
Which of the following statements best describes a Data Mart?
Signup and view all the answers
What does First Normal Form (1NF) require in a relational database?
What does First Normal Form (1NF) require in a relational database?
Signup and view all the answers
What is the key distinction between a database model and a database schema?
What is the key distinction between a database model and a database schema?
Signup and view all the answers
In which type of database key do multiple attributes collaborate to generate a unique identifier?
In which type of database key do multiple attributes collaborate to generate a unique identifier?
Signup and view all the answers
Which SQL command is used to filter records based on specific criteria?
Which SQL command is used to filter records based on specific criteria?
Signup and view all the answers
What does a Dimension Table in a database schema provide?
What does a Dimension Table in a database schema provide?
Signup and view all the answers
What is represented by a Start Event in BPMN Activity Models?
What is represented by a Start Event in BPMN Activity Models?
Signup and view all the answers
What is the role of Intermediate Events in BPMN Activity Models?
What is the role of Intermediate Events in BPMN Activity Models?
Signup and view all the answers
Which of the following best defines a Data Lake?
Which of the following best defines a Data Lake?
Signup and view all the answers
What type of flow do Sequence Flows represent in BPMN?
What type of flow do Sequence Flows represent in BPMN?
Signup and view all the answers
What is the definition of a Data Dictionary in the context of databases?
What is the definition of a Data Dictionary in the context of databases?
Signup and view all the answers
Which of the following features distinguishes a Snowflake Schema from a Star Schema?
Which of the following features distinguishes a Snowflake Schema from a Star Schema?
Signup and view all the answers
Which system aggregates daily financial information for infrequent events such as mergers and lawsuits?
Which system aggregates daily financial information for infrequent events such as mergers and lawsuits?
Signup and view all the answers
What is the primary goal of the Management Reporting System (MRS)?
What is the primary goal of the Management Reporting System (MRS)?
Signup and view all the answers
In which cycle does a company pay its employees?
In which cycle does a company pay its employees?
Signup and view all the answers
What is NOT a function of the Purchasing and Disbursement Cycle?
What is NOT a function of the Purchasing and Disbursement Cycle?
Signup and view all the answers
What does the term 'Annualized Loss Expectancy (ALE)' refer to?
What does the term 'Annualized Loss Expectancy (ALE)' refer to?
Signup and view all the answers
Which of the following is NOT a key function of Robotic Process Automation (RPA)?
Which of the following is NOT a key function of Robotic Process Automation (RPA)?
Signup and view all the answers
What is the Recovery Point Objective (RPO)?
What is the Recovery Point Objective (RPO)?
Signup and view all the answers
What does the acronym COSO stand for in the context of internal controls?
What does the acronym COSO stand for in the context of internal controls?
Signup and view all the answers
Which phase of Business Impact Analysis (BIA) involves identifying risks?
Which phase of Business Impact Analysis (BIA) involves identifying risks?
Signup and view all the answers
Which of the following best describes the meaning of 'Maximum Tolerable Downtime (MTD)'?
Which of the following best describes the meaning of 'Maximum Tolerable Downtime (MTD)'?
Signup and view all the answers
What type of technology does blockchain primarily represent?
What type of technology does blockchain primarily represent?
Signup and view all the answers
Which element is critical for effective crisis management plans?
Which element is critical for effective crisis management plans?
Signup and view all the answers
Which function is associated with the General Ledger and Reporting system?
Which function is associated with the General Ledger and Reporting system?
Signup and view all the answers
Which accounting cycle is responsible for buying and paying for goods and services?
Which accounting cycle is responsible for buying and paying for goods and services?
Signup and view all the answers
Study Notes
IT Infrastructure
-
Computer Hardware: physical components of computers, including external peripherals (mouse, keyboard, etc.), back-end devices (switches, servers, routers), and end-user devices (laptops, tablets).
-
Internal Hardware: microprocessor (brain), graphics/sound cards, hard drives (permanent storage), RAM (temporary storage), power supply, motherboard.
-
External Peripherals: devices not integrated into the computer, such as monitors, disk drives, memory devices, network cards, speakers, and microphones.
-
Infrastructure Housing: data centers or offices, advanced security systems, ventilation, and climate control.
-
Network Infrastructure Hardware: hardware, software, layout, and topology of network resources for connectivity and communication.
Network Infrastructure
-
Modems: connect computers to the internet, translating analog signals to digital, providing internet access to homes or offices.
-
Routers: manage network traffic, read source packets, route them, assign IP addresses, and connect modems to switches.
-
Switches: divide network connections, route traffic to specific destinations, but cannot assign IP addresses like routers (essentially a more advanced hub).
-
Gateways: act as intermediaries between networks, converting protocols.
-
Proxies: gateways that mediate without protocol translation, often blocking hackers.
-
Protocol: sets of rules for information transmission, like TCP/IP (common internet protocol).
-
Edge-enabled devices: process data near the source, decentralizing power and speeding network response.
-
Servers: master coordination and communication in networks, serving data to clients.
-
Signal Modifiers: increase signal strength for electrical, radio frequency, audio, and optical signals.
-
Firewalls: prevent unauthorized access through physical, software, or combined methods; improve traffic flow.
Types of Firewalls
-
Basic Packet-Filtering Firewalls: analyze network packets to determine if data should pass through the firewall.
-
Circuit-Level Firewall: verify packet source against rules, but don't inspect the packet itself.
-
Application-Level Firewalls: inspect packet data and are resource-intensive.
-
Network Address Translation (NAT) Firewalls: assign single public address to private network masks.
-
Stateful Multilayer Inspection Firewalls: combination of packet filtering and NAT.
-
Next-Generation Firewalls (NGFWs): apply firewall rules to specific applications and users.
Network Topology
-
Bus Topology: linear or tree-like layout, failure of central line disables the entire network.
-
Mesh Topology: numerous connections between nodes, commonly used in wireless networks; high traffic, costly.
-
Ring Topology: circular node connections, minimized collision but slower performance.
-
Star Topology: central hub through which data passes; easy cable damage identification.
OSI Model
-
OSI model: seven-layer model for network function segregation.
-
Layer 7 (Application): interface for applications, including HTTP, FTP, SMTP, and EDI.
-
Layer 6 (Presentation): transforms data, handles encryption using standards like ASCII, JPEG, MPEG.
-
Layer 5 (Session): establishes and maintains sessions between devices, using protocols like SQL, RPC, and NFS.
-
Layer 4 (Transport): controls communication connections (TCP, UDP, SSL, TLS).
-
Layer 3 (Network): adds routing addresses, uses IP, IPSec, NAT, and IGMP.
-
Layer 2 (Data Link): formats data packets (MAC addresses); uses ISDN, PPTP, L2TP, ARP.
-
Layer 1 (Physical): converts messages to bits (0s and 1s) for transmission, using technologies like HSSI and SONET.
Common Network Architectures
-
Local Area Networks (LAN): limited geographic area.
-
Wide Area Networks (WAN): larger geographic area, encompassing multiple offices or the internet.
-
Software-Defined WAN (SD-WAN): manages traffic to optimize connectivity.
-
Virtual Private Network (VPN): remote, secure access to a network.
Operating Systems (OS), Firmware, Mobile Technology, IoT
-
Operating systems (OS): software that supports basic computer functions; e.g., Windows, macOS, iOS.
-
Firmware: embedded software directing motherboard/microprocessor functions; less frequently updated.
-
Mobile technology: wireless enabled devices connecting to the internet; includes laptops, tablets, hotspots, mobile phones, applications, OS, and connectivity via Wi-Fi, Bluetooth, 4G/5G.
-
Internet of Things (IoT): devices like Siri, Alexa, TVs, iHomes; extension of mobile technology, usually connected via Bluetooth or internet.
Cloud Computing
-
Cloud Computing: shared computing resources over the internet (e.g., storage, processing, software).
-
Cloud models:
- Infrastructure as a Service (IaaS): outsourcing servers, storage, hardware, and networking.
- Platform as a Service (PaaS): providing tools for application development.
- Software as a Service (SaaS): selling applications or business process services (e.g., payroll, billing).
-
Cloud deployment models: public, private, hybrid, community.
-
Cloud Service Provider (CSP): third-party providing cloud services.
-
Governance frameworks: Cloud Controls Matrix, COSO Enterprise Risk Management (including SPRIG methodology).
Other Topics
-
Types of Processing Controls: input, output, processing, access controls.
-
General Controls: software acquisition, IT infrastructure, security management, development/operations/maintenance controls.
-
Enterprise Resource Planning (ERP): cross-functional, central data repository systems for various business functions.
-
Accounting Information Systems (AIS): systems used by accountants/financial managers, often a component of an ERP.
-
Reasonableness Test: error check for transaction totals.
-
AIS Subsystems: Transaction Processing Systems (TPS), Financial Reporting System (FRS), and Management Reporting System (MRS).
-
AIS Processes: input, source document processing, journal recording, GL/subsidiary ledger posting, trial balances, adjustments, financial report generation. Cycles include purchasing/disbursement, treasury, payroll, revenue/collection.
-
Application Software Provider (ASP) benefits: lower upfront costs, flexibility, suitable for smaller businesses.
-
Processes driven by IT: automation, shared services, outsourcing, offshore operations (IT, knowledge, business processes, software R&D).
-
Risks in outsourcing: quality, service, productivity, staff turnover, language, security, outsourcer qualifications, labor insecurity.
-
Technology forms of IT systems: Robotic Process Automation (RPA), Natural Language Processing (NLP), neural networks.
-
COSO Principles related to IT: general control over technology, acquisition of quality information, effective communication.
-
Blockchain: decentralized, altered transaction-resistant system.
-
Business Resiliency: continuous operation and quick restoration after events; involves business continuity plans, system availability controls, and crisis management.
-
Business Impact Analysis (BIA): identifies how quickly business units can recover.
-
Recovery Point Objective (RPO) / Recovery Time Objective (RTO): maximum acceptable data loss/inoperability.
-
System Availability Controls: redundancy, backups, UPS systems, infrastructure security, physical controls.
-
Disaster Recovery: specific IT systems restoration after a major outage.
-
Backup Types: full, incremental, differential.
-
Replication vs. Mirroring: replication transfers data to a secondary site; mirroring copies a database to the same site.
-
Change Management: policies, procedures, and resources for change governance.
-
Change Management Process: identifying need, planning, approval, budgeting, personnel assignment, risk identification, implementation, testing, execution, review, monitoring.
-
Documenting System Controls: baseline configuration, inventory system, acceptance criteria.
-
Change Management Controls: policies/procedures, standardized requests, job separation, testing, reversion access.
-
Change Environments: development, testing, staging, production, disaster recovery.
-
Integration Risks: user resistance, management/stakeholder support issues, resource concerns, business disruptions, and lack of system integration.
-
Logging: critical for testing, including application, change, event, firewall, network, proxy logs.
-
Data Collection Types: active, passive.
-
Data Lifecycle: capturing, transforming, synthesizing, analyzing, publishing, archiving, and purging data.
-
Data Collection methods: ETL, active, passive data collection.
-
Data Storage: ODS, data warehouses, data marts, data lakes, Relational databases, Data Elements (tables, attributes, records, fields, data types, keys).
- Database Keys: primary keys, composite primary keys, foreign keys.
-
Data Dictionary: Information about database structure and elements.
-
Data Normalization: 1NF, 2NF, 3NF, data model types (conceptual, logical, physical), data models (star, snowflake).
-
Structured Query Language(SQL): command structure and examples of SELECT, FROM, JOIN, WHERE, HAVING, GROUP BY
-
Data Flow Diagrams (DFDs) / Flowcharts / System Interface Diagrams: standardized diagrams for process visualization
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on IT infrastructure, including computer hardware, internal and external peripherals, and network components. This quiz covers essential concepts and devices used in modern IT environments.