Deck 14: Information Systems and Controls
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/100
العب
ملء الشاشة (f)
Deck 14: Information Systems and Controls
1
Which statement about Information Technology (IT) is FALSE?
A) IT includes the technology and processes involved with technology.
B) IT is concerned with both hardware and software.
C) IT includes controls for facility power and utilities.
D) IT includes systems for the processing and distribution of data.
A) IT includes the technology and processes involved with technology.
B) IT is concerned with both hardware and software.
C) IT includes controls for facility power and utilities.
D) IT includes systems for the processing and distribution of data.
IT includes controls for facility power and utilities.
2
Which statement describing COBIT 2019 is TRUE?
A) COBIT contributors do not have the pay the subscription fee.
B) COBIT has an organizational focus on HR governance.
C) COBIT is designed to assist in IT governance and implementing IT controls.
D) COBIT has a control scope that encompasses all internal controls.
A) COBIT contributors do not have the pay the subscription fee.
B) COBIT has an organizational focus on HR governance.
C) COBIT is designed to assist in IT governance and implementing IT controls.
D) COBIT has a control scope that encompasses all internal controls.
COBIT is designed to assist in IT governance and implementing IT controls.
3
COBIT 2019 controls are organized into five domains that are divided into what two categories based on their objectives?
A) Internal and external
B) Organization and implementation
C) Governance and management
D) Management and assessment
A) Internal and external
B) Organization and implementation
C) Governance and management
D) Management and assessment
Governance and management
4
Which of the following statements about the COBIT 2019 IT governance domain, Evaluate, Direct and Monitor (EDM) is TRUE?
A) EDM relates to the operational side of IT projects and support.
B) EDM focuses on whether IT projects are meeting organizational objectives.
C) EDM assesses IT requirements for acquiring technology.
D) EDM states that the board of directors must assess needs and provide oversight.
A) EDM relates to the operational side of IT projects and support.
B) EDM focuses on whether IT projects are meeting organizational objectives.
C) EDM assesses IT requirements for acquiring technology.
D) EDM states that the board of directors must assess needs and provide oversight.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following statements about COBIT 2019 is TRUE?
A) COBIT is an open-source model that has an online platform for feedback.
B) COBIT is a part of the COSO Internal Controls
C) COBIT focuses on addressing risk from a strategic perspective.
D) COBIT has a control scope that encompasses all internal controls.
A) COBIT is an open-source model that has an online platform for feedback.
B) COBIT is a part of the COSO Internal Controls
C) COBIT focuses on addressing risk from a strategic perspective.
D) COBIT has a control scope that encompasses all internal controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following statements concerning IT governance are TRUE?
A) IT governance requires a dedicated department.
B) IT governance ensures effective and efficient use of IT.
C) IT governance should be scheduled to occur once per year.
D) IT governance standards framework, COSO, focuses on minimizing risk.
A) IT governance requires a dedicated department.
B) IT governance ensures effective and efficient use of IT.
C) IT governance should be scheduled to occur once per year.
D) IT governance standards framework, COSO, focuses on minimizing risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
7
What is the most widely used international standard for IT governance?
A) COSO
B) COBIT
C) ISACA
D) ITGC
A) COSO
B) COBIT
C) ISACA
D) ITGC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
8
ABC Technology Management, InC. is seeking guidance on managing risk, security, budgets, and innovation. Which COBIT 2019 management IT objective should ABC consult?
A) Align, Plan and Organize (APO)
B) Build, Acquire and Implement (BAI)
C) Deliver, Service and Support (DSS)
D) Monitor, Evaluate and Assess (MEA)
A) Align, Plan and Organize (APO)
B) Build, Acquire and Implement (BAI)
C) Deliver, Service and Support (DSS)
D) Monitor, Evaluate and Assess (MEA)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following COBIT 2019 management IT objectives includes topics that would help an organization define project requirements, change management guidelines, and project execution plans?
A) Align, Plan and Organize (APO)
B) Build, Acquire and Implement (BAI)
C) Deliver, Service and Support (DSS)
D) Monitor, Evaluate and Assess (MEA)
A) Align, Plan and Organize (APO)
B) Build, Acquire and Implement (BAI)
C) Deliver, Service and Support (DSS)
D) Monitor, Evaluate and Assess (MEA)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following COBIT 2019 management IT objectives includes topics that would help an organization manage operations, problems, continuity, and business process controls?
A) Align, Plan and Organize (APO)
B) Build, Acquire and Implement (BAI)
C) Deliver, Service and Support (DSS)
D) Monitor, Evaluate and Assess (MEA)
A) Align, Plan and Organize (APO)
B) Build, Acquire and Implement (BAI)
C) Deliver, Service and Support (DSS)
D) Monitor, Evaluate and Assess (MEA)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following COBIT 2019 management IT objectives includes topics that would help an organization define compliance with external requirements, performance monitoring, and a system of internal control?
A) Align, Plan and Organize (APO)
B) Build, Acquire and Implement (BAI)
C) Deliver, Service and Support (DSS)
D) Monitor, Evaluate and Assess (MEA)
A) Align, Plan and Organize (APO)
B) Build, Acquire and Implement (BAI)
C) Deliver, Service and Support (DSS)
D) Monitor, Evaluate and Assess (MEA)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
12
What elements of IT are IT general controls (ITGCs) designed to protect? Select all that apply.
A) Structure
B) Components
C) Data
D) Risk
A) Structure
B) Components
C) Data
D) Risk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
13
IT governance frameworks define the criteria that a company uses for which aspects of IT governance? Select all that apply.
A) Management
B) Monitoring
C) Objections
D) Implementation
A) Management
B) Monitoring
C) Objections
D) Implementation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
14
Accounting professionals utilize multiple frameworks. Which framework would a manager select to make sure that all internal controls are Sarbanes Oxley compliant?
A) ITGC
B) COSO
C) ISACA
D) COBIT
A) ITGC
B) COSO
C) ISACA
D) COBIT
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which framework would an IT manager select to make sure that access to sensitive customer data is limited to only those who require access?
A) ITGC
B) COSO
C) ISACA
D) COBIT
A) ITGC
B) COSO
C) ISACA
D) COBIT
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
16
The objectives of which COBIT domain include frameworks, resource optimization, and being transparent with stakeholders?
A) Align, Plan and Organize (APO)
B) Build, Acquire and Implement (BAI)
C) Deliver, Service and Support (DSS)
D) Evaluate, Direct, and Monitor (EDM)
A) Align, Plan and Organize (APO)
B) Build, Acquire and Implement (BAI)
C) Deliver, Service and Support (DSS)
D) Evaluate, Direct, and Monitor (EDM)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
17
Angela is tasked with reviewing the IT service request process for her accounting firm. Which COBIT domain should she reference?
A) Align, Plan and Organize (APO)
B) Build, Acquire and Implement (BAI)
C) Deliver, Service and Support (DSS)
D) Monitor, Evaluate, and Assess (MEA)
A) Align, Plan and Organize (APO)
B) Build, Acquire and Implement (BAI)
C) Deliver, Service and Support (DSS)
D) Monitor, Evaluate, and Assess (MEA)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
18
Wade is tasked with evaluating and recommending improvements to the project management framework for his accounting firm. Which COBIT domain should he reference?
A) Align, Plan and Organize (APO)
B) Build, Acquire and Implement (BAI)
C) Deliver, Service and Support (DSS)
D) Monitor, Evaluate, and Assess (MEA)
A) Align, Plan and Organize (APO)
B) Build, Acquire and Implement (BAI)
C) Deliver, Service and Support (DSS)
D) Monitor, Evaluate, and Assess (MEA)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
19
Select the appropriate role assigned to a leader in the IT team who needs unlimited access and is responsible for assigning roles to other users.
A) Creator
B) Read-only
C) User
D) Administrator
A) Creator
B) Read-only
C) User
D) Administrator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
20
New users to a system are granted access through what formal process?
A) User access provisioning
B) User authentication
C) User role assignment
D) User validation
A) User access provisioning
B) User authentication
C) User role assignment
D) User validation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following is an example of a user authentication control?
A) Username and password
B) Login name
C) Electronic safe
D) Employee handbook
A) Username and password
B) Login name
C) Electronic safe
D) Employee handbook
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following statements concerning user access reviews is TRUE?
A) User access reviews are periodic reviews of current power users and their system roles.
B) User access reviews move infrequently used accounts to a dormant status.
C) A user access review should be a simple, quick process that is completed frequently.
D) A user access review lowers inappropriate use risks associated with employee changes.
A) User access reviews are periodic reviews of current power users and their system roles.
B) User access reviews move infrequently used accounts to a dormant status.
C) A user access review should be a simple, quick process that is completed frequently.
D) A user access review lowers inappropriate use risks associated with employee changes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of these access roles would you assign a graphic designer working on updating the internal corporate data dashboard to include key financial data?
A) Administrator
B) Read-only
C) User
D) Creator
A) Administrator
B) Read-only
C) User
D) Creator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
24
What role should be assigned to a new team member who just needs access to review files and not make changes?
A) Creator
B) Read-only
C) User
D) Administrator
A) Creator
B) Read-only
C) User
D) Administrator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which type of authorization uses groups with pre-defined permissions to which users are assigned?
A) Permission roles
B) User access roles
C) Creator roles
D) Read-only roles
A) Permission roles
B) User access roles
C) Creator roles
D) Read-only roles
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of these access roles would you assign an internal auditor reviewing accounts payable and accounts receivable transactions?
A) Administrator
B) Read-only
C) User
D) Creator
A) Administrator
B) Read-only
C) User
D) Creator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
27
Sushma, the IT employee responsible for setting up user names and passwords, handles user access updates daily to prevent inappropriate access to the organization's system. After what event should Sushma complete user access de-provisioning for an organization employee?
A) Employee new hire
B) Employee reprimand
C) Employee transfer
D) Employee award
A) Employee new hire
B) Employee reprimand
C) Employee transfer
D) Employee award
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
28
Select each of the following examples of a logical user access control? Choose all that apply.
A) Security badge
B) Multifactor authentication
C) Biometric authentication
D) Fingerprint scanner
A) Security badge
B) Multifactor authentication
C) Biometric authentication
D) Fingerprint scanner
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
29
Adrian evaluated Branch Technologies user access assignment procedures and found them to be inefficient. Rather than assign each user permissions individually, Adrian recommends that Branch Technologies define roles with pre-defined access criteria and assign users to roles. What type of authorization is Adrian recommending?
A) Role-based access controls
B) Individual permissions
C) Physical access controls
D) User access de-provisioning
A) Role-based access controls
B) Individual permissions
C) Physical access controls
D) User access de-provisioning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
30
User access de-provisioning should occur when which of the following user access status changes occur? Choose all that apply.
A) Termination
B) New hire
C) Transfer
D) Dormancy
A) Termination
B) New hire
C) Transfer
D) Dormancy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
31
A user access review is an important yet tedious and time-consuming process. What kind of newer technology can be implemented to automate or semi-automate the process?
A) Analytical automation
B) Machine learning algorithm
C) User access software
D) Dormancy software tools
A) Analytical automation
B) Machine learning algorithm
C) User access software
D) Dormancy software tools
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following statements about user access de-provisioning is FALSE?
A) User access de-provisioning is the formal process of changing a user's access.
B) User access de-provisioning should occur after an employee's termination or transfer.
C) Removing someone's access does not create risk for the system.
D) Removing access to systems is not required for employee promotions.
A) User access de-provisioning is the formal process of changing a user's access.
B) User access de-provisioning should occur after an employee's termination or transfer.
C) Removing someone's access does not create risk for the system.
D) Removing access to systems is not required for employee promotions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
33
Alejandro reviewed the user access protocols for Ponder Products. Alejandro is concerned that the accounting system could be subject to malicious attacks on user accounts that are currently protected with a user name and password. The system has the capability to send a message to a user's cell phone or email address. How could Alejandro use the messaging capabilities of the system to further protect it from attack?
A) Enable two-factor authentication
B) Enable fingerprint scanners
C) Enable read-only access for all users
D) Enable administrator access for all users
A) Enable two-factor authentication
B) Enable fingerprint scanners
C) Enable read-only access for all users
D) Enable administrator access for all users
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
34
What role should be assigned to a new team member who needs access to make changes to the system, create files, download and upload files, and edit files.
A) Creator
B) Read-only
C) User
D) Administrator
A) Creator
B) Read-only
C) User
D) Administrator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which statement about user access provisioning request tickets is TRUE?
A) Request tickets require the employee to explain why they need access to the system.
B) Request tickets require the user's direct supervisor's information.
C) Managers and system owners must review the request tickets.
D) All of these statements are true.
A) Request tickets require the employee to explain why they need access to the system.
B) Request tickets require the user's direct supervisor's information.
C) Managers and system owners must review the request tickets.
D) All of these statements are true.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
36
What user access role includes permission to add, remove, and set access rights on all objects?
A) Administrator
B) Creator
C) User
D) Read-only
A) Administrator
B) Creator
C) User
D) Read-only
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
37
An internal auditor inspecting a data center will look at all the following components.
A) Security system
B) Fire protection
C) Physical access
D) All answer choices are correct.
A) Security system
B) Fire protection
C) Physical access
D) All answer choices are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
38
Controlled access to data centers often includes multifactor authentication to mitigate the high risk to the equipment that is powering the business. An increased security measure used at very high security data centers is a man-in-the-middle trap. What kind of risk does the trap prevent?
A) Wind damage
B) Piggybacking
C) Provisioning
D) Flood damage
A) Wind damage
B) Piggybacking
C) Provisioning
D) Flood damage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which of the following roles have control ownership related to protecting the physical computer systems?
A) Information Security Manager
B) Data Center Manager
C) Facilities Manager
D) All answer choices are correct.
A) Information Security Manager
B) Data Center Manager
C) Facilities Manager
D) All answer choices are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which of the following statements represents a poor design element for a data center protected from the outside environment?
A) A data center with a two-phase fire suppression system and fire extinguishers
B) A data center with cables suspended from the ceiling or bundled up to racks
C) A data center located on the top floor of a building to prevent easy access
D) A data center located on a raised floor near the center of an offsite building
A) A data center with a two-phase fire suppression system and fire extinguishers
B) A data center with cables suspended from the ceiling or bundled up to racks
C) A data center located on the top floor of a building to prevent easy access
D) A data center located on a raised floor near the center of an offsite building
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
41
What kind of security method can help prevent against piggybacking?
A) User name and password
B) Fingerprint scanner
C) Locked door
D) Man-in-the-middle trap
A) User name and password
B) Fingerprint scanner
C) Locked door
D) Man-in-the-middle trap
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
42
Which of the following are physical security measures used to prevent unauthorized access to a data center?
A) Single entrance
B) Security camera at entrance
C) Multifactor authentication
D) All answer choices are correct.
A) Single entrance
B) Security camera at entrance
C) Multifactor authentication
D) All answer choices are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
43
Which of the following are risks to physical IT equipment and systems?
A) A natural disaster causing damage to systems and equipment may result in a disruption of business activities and financial losses.
B) An unauthorized user gaining access to physical equipment may result in theft, malicious attacks, fraud, or data breaches.
C) Failure to maintain facilities in accordance with laws and regulations may result in fines and reputational losses.
D) All answer choices are correct.
A) A natural disaster causing damage to systems and equipment may result in a disruption of business activities and financial losses.
B) An unauthorized user gaining access to physical equipment may result in theft, malicious attacks, fraud, or data breaches.
C) Failure to maintain facilities in accordance with laws and regulations may result in fines and reputational losses.
D) All answer choices are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
44
What kind of facility is used to protect the physical components on which systems and data are stored?
A) System center
B) Network operations center
C) Access center
D) All of these answer choices are correct.
A) System center
B) Network operations center
C) Access center
D) All of these answer choices are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
45
Moore Software Development (MSD), Inc. began operations in Moore, Oklahoma, an area prone to tornadoes. Recent business growth necessitates the need for a larger data center. Select the most appropriate statement associated with MSD's new data center.
A) MSD should expand their current on-site data center so that all components will be secure in one location.
B) MSD should lease data center space nearby to allow current IT staff easy access to additional components.
C) MSD should locate a space for an off-site data center in an area away from the risk of bad weather to mitigate the risk of losing both centers at the same time.
D) All of these statements are correct.
A) MSD should expand their current on-site data center so that all components will be secure in one location.
B) MSD should lease data center space nearby to allow current IT staff easy access to additional components.
C) MSD should locate a space for an off-site data center in an area away from the risk of bad weather to mitigate the risk of losing both centers at the same time.
D) All of these statements are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
46
Data centers should be situated in a room with no windows to prevent
A) someone from breaking in through the window.
B) damage occurring to systems when a window breaks in a storm.
C) unauthorized access to the room.
D) All answer choices are correct.
A) someone from breaking in through the window.
B) damage occurring to systems when a window breaks in a storm.
C) unauthorized access to the room.
D) All answer choices are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
47
Caribbean Technologies is located on the island of Grand Cayman in the Caribbean SeA. The management team established a data center both onsite and offsite in Ohio. What onsite protection measures would you recommend be implemented?
A) Climate controls
B) Raised floors
C) Interior room with no windows
D) All answer choices are correct.
A) Climate controls
B) Raised floors
C) Interior room with no windows
D) All answer choices are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
48
In what ways do climate control systems protect computer system components in a network operations center (NOC)?
A) Climate control systems keep NOCs cool.
B) Climate control systems remove humidity in the NOC to prevent moisture damage.
C) Climate control systems prevent NOC components from overheating.
D) All answer choices are correct.
A) Climate control systems keep NOCs cool.
B) Climate control systems remove humidity in the NOC to prevent moisture damage.
C) Climate control systems prevent NOC components from overheating.
D) All answer choices are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
49
Which of the following is a poor network operations center (NOC) power practice?
A) An uninterruptable power supply is used to protect systems from outage and surges.
B) An uninterruptable power supply is used to protect systems from varied power voltage.
C) Power and network cables are run along the back of machines along the floor to keep them out of the way.
D) Power and network cables are bundled up to racks suspended from the ceiling to keep them clean and visible.
A) An uninterruptable power supply is used to protect systems from outage and surges.
B) An uninterruptable power supply is used to protect systems from varied power voltage.
C) Power and network cables are run along the back of machines along the floor to keep them out of the way.
D) Power and network cables are bundled up to racks suspended from the ceiling to keep them clean and visible.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
50
Which of the following is a poor policy for physical access control for a data center?
A) Only employees directly involved with operating the data center are authorized to enter.
B) Employees must scan their badge then enter a PIN on a keypad to gain access to the data center.
C) Security personnel regularly walk the building perimeter and look through the outside windows to check for unauthorized access to the data center.
D) Security cameras at the data center entrance door record all entrances and exits from the data center.
A) Only employees directly involved with operating the data center are authorized to enter.
B) Employees must scan their badge then enter a PIN on a keypad to gain access to the data center.
C) Security personnel regularly walk the building perimeter and look through the outside windows to check for unauthorized access to the data center.
D) Security cameras at the data center entrance door record all entrances and exits from the data center.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
51
How does a man-in-the middle trap create another level of security?
A) The man-in-the middle trap forces users to spend time in the trap before entering the data center, so only those who really need in will enter.
B) The man-in-the middle trap allows only one person to be between two doors, each with security measures, at a time.
C) The man-in-the middle trap will not allow a person to exit if they do not have the verbal passcode to enter the data center.
D) The man-in-the middle trap allows data center employees to trap intruders using trapdoors in the raised floor.
A) The man-in-the middle trap forces users to spend time in the trap before entering the data center, so only those who really need in will enter.
B) The man-in-the middle trap allows only one person to be between two doors, each with security measures, at a time.
C) The man-in-the middle trap will not allow a person to exit if they do not have the verbal passcode to enter the data center.
D) The man-in-the middle trap allows data center employees to trap intruders using trapdoors in the raised floor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
52
Which control activity related to physical security is managed by the data center manager?
A) Eating and drinking is prohibited where IT equipment is stored.
B) Policies and procedures for maintaining physical equipment are documented.
C) Access to buildings is justified, authorized, logged, and monitored.
D) Inappropriate access to IT equipment is immediately revoked.
A) Eating and drinking is prohibited where IT equipment is stored.
B) Policies and procedures for maintaining physical equipment are documented.
C) Access to buildings is justified, authorized, logged, and monitored.
D) Inappropriate access to IT equipment is immediately revoked.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
53
Which control activity related to physical security is managed by the facilities manager?
A) Eating and drinking is prohibited where IT equipment is stored.
B) Policies and procedures for maintaining physical equipment are documented.
C) Access to buildings is justified, authorized, logged, and monitored.
D) Inappropriate access to IT equipment is immediately revoked.
A) Eating and drinking is prohibited where IT equipment is stored.
B) Policies and procedures for maintaining physical equipment are documented.
C) Access to buildings is justified, authorized, logged, and monitored.
D) Inappropriate access to IT equipment is immediately revoked.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following plans are included in business continuity planning?
A) Crisis reaction plans indicating who leads the organization's response
B) Plans for essential equipment to be protected or to have alternative equipment
C) Return to normal procedures that prescribe how to return to normal operations
D) All answer choices are correct
A) Crisis reaction plans indicating who leads the organization's response
B) Plans for essential equipment to be protected or to have alternative equipment
C) Return to normal procedures that prescribe how to return to normal operations
D) All answer choices are correct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
55
Disaster recovery planning involves categorizing systems and data based on importance to the business. Which of the following types of systems going down could have a detrimental impact on a business and should have a restoration plan that minimizes downtime to a few hours or less?
A) Retail point of sale system
B) Employee benefits system
C) Customer service management system
D) Payroll system
A) Retail point of sale system
B) Employee benefits system
C) Customer service management system
D) Payroll system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
56
Which of the following backup sites is the most expensive but has the fastest recovery speed?
A) Hot backup site
B) Warm backup site
C) Cold backup site
D) Frozen backup site
A) Hot backup site
B) Warm backup site
C) Cold backup site
D) Frozen backup site
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
57
Which of the following statements concerning data backups are TRUE?
A) A data backup is the output of copying computer data to store.
B) Backup storage can be costly and time consuming.
C) Incremental backups are the cheapest backup strategy.
D) All answer choices are correct.
A) A data backup is the output of copying computer data to store.
B) Backup storage can be costly and time consuming.
C) Incremental backups are the cheapest backup strategy.
D) All answer choices are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
58
The CEO of All-Farm Insurance asked you to verify that organization data is fully backed up each weekend and that all new data is backed up daily. On the daily backups, the CEO requests that all new data since the full backup is stored. What type of backup strategy should you choose?
A) Hot backup
B) Full backup
C) Differential backup
D) Incremental backup
A) Hot backup
B) Full backup
C) Differential backup
D) Incremental backup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
59
IT Solutions Express (ITSE) is a database service firm in an area prone to tornadoes. Because ITSE stores critical data, they have a hot backup site for systems and data. As part of ITSE's disaster recovery plan, they need a plan that allows key personnel to resume work offsite within 4 hours if a tornado happens to strike their main facility. What kind of disaster recovery plan is necessary to meet the business requirements of ITSE?
A) Alternative backup site plan
B) Backup team plan
C) Alternative operations site plan
D) Backup direction site plan
A) Alternative backup site plan
B) Backup team plan
C) Alternative operations site plan
D) Backup direction site plan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
60
Which of the following backup sites is the least expensive but has the slowest recovery speed?
A) Hot backup site
B) Warm backup site
C) Cold backup site
D) Frozen backup site
A) Hot backup site
B) Warm backup site
C) Cold backup site
D) Frozen backup site
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
61
Which type of backup copies all data during every backup?
A) Hot backup
B) Full backup
C) Differential backup
D) Incremental backup
A) Hot backup
B) Full backup
C) Differential backup
D) Incremental backup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
62
Which type of backup copies only new or updated data every time?
A) Hot backup
B) Full backup
C) Differential backup
D) Incremental backup
A) Hot backup
B) Full backup
C) Differential backup
D) Incremental backup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
63
What determines when data is being stored during data back?
A) Backup cycle
B) Backup time
C) Backup calendar
D) Backup event
A) Backup cycle
B) Backup time
C) Backup calendar
D) Backup event
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
64
Which statements concerning Business Continuity Planning (BCP) are TRUE? Select all statements that are TRUE.
A) BCP includes the procedures taken to protect employees, stakeholders, and assets in the event of a disruptive event.
B) BCP procedures focus on hot backup sites as all systems are critical and must be recovered quickly.
C) After the BCP manager develops the BCP, plans need to be memorized and not changed over time so that all employees know what to expect and do when a disruptive event occurs.
D) BCP plans could be triggered by a variety of disruptive events, such as natural disasters, cyberattacks, social unrest, or a global pandemic.
A) BCP includes the procedures taken to protect employees, stakeholders, and assets in the event of a disruptive event.
B) BCP procedures focus on hot backup sites as all systems are critical and must be recovered quickly.
C) After the BCP manager develops the BCP, plans need to be memorized and not changed over time so that all employees know what to expect and do when a disruptive event occurs.
D) BCP plans could be triggered by a variety of disruptive events, such as natural disasters, cyberattacks, social unrest, or a global pandemic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
65
What physical location is used to recover systems and data after a disaster?
A) Data center
B) Backup site
C) Recovery center
D) Strategy site
A) Data center
B) Backup site
C) Recovery center
D) Strategy site
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
66
What statement about the functionality of a cold backup site is FALSE?
A) A cold backup site may be an almost empty room.
B) A cold backup site is the least expensive type of backup site for a company to implement.
C) A cold backup site imports data at the end of each business day.
D) A cold backup site may take days or weeks to recover.
A) A cold backup site may be an almost empty room.
B) A cold backup site is the least expensive type of backup site for a company to implement.
C) A cold backup site imports data at the end of each business day.
D) A cold backup site may take days or weeks to recover.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
67
What statement concerning backup cycles is FALSE?
A) Warm and cold backup sites depend on which backup cycle is used.
B) A backup cycle determines the frequency in which data is backed up.
C) One of the most common backup cycle methods is know as the Grandfather-Father-Son backup scheme.
D) The Grandfather-Father-Son backup cycle removes the need to conduct quarterly, or annual backups.
A) Warm and cold backup sites depend on which backup cycle is used.
B) A backup cycle determines the frequency in which data is backed up.
C) One of the most common backup cycle methods is know as the Grandfather-Father-Son backup scheme.
D) The Grandfather-Father-Son backup cycle removes the need to conduct quarterly, or annual backups.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
68
If a company were to utilize the Grandfather-Father-Son backup scheme, what backup cycles are implemented?
A) Full backup once per month and week and a smaller backup each day
B) Full backup once per month, differential once per week, and incremental once per day
C) Full backup once per quarter and month and a smaller backup each week and day
D) Full backup once per year, differential once per month, and incremental each day
A) Full backup once per month and week and a smaller backup each day
B) Full backup once per month, differential once per week, and incremental once per day
C) Full backup once per quarter and month and a smaller backup each week and day
D) Full backup once per year, differential once per month, and incremental each day
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
69
When disaster strikes, what two metrics concerning system and data restoration are important to consider?
A) Recovery Technology Objective (RTO) and Recovery Process Objective (RPO)
B) Recovery Technology Objective (RTO) and Recovery Point Objective (RPO)
C) Recovery Time Objective (RTO) and Recovery Point Objective (RPO)
D) Recovery Time Objective (RTO) and Recovery Process Objective (RPO)
A) Recovery Technology Objective (RTO) and Recovery Process Objective (RPO)
B) Recovery Technology Objective (RTO) and Recovery Point Objective (RPO)
C) Recovery Time Objective (RTO) and Recovery Point Objective (RPO)
D) Recovery Time Objective (RTO) and Recovery Process Objective (RPO)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
70
Which statement concerning the disaster response Recovery Time Objective (RTO) is TRUE?
A) The RTO is how much time a system can be down before it causes significant damage to the business.
B) The RTO may be as short as a few seconds.
C) The RTO considers how long the system restoration and data re-load process takes.
D) All of these statements are true.
A) The RTO is how much time a system can be down before it causes significant damage to the business.
B) The RTO may be as short as a few seconds.
C) The RTO considers how long the system restoration and data re-load process takes.
D) All of these statements are true.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
71
Which type of backup strategy copies all data created since the most recent full backup in its entirety every time?
A) Hot backup
B) Full backup
C) Differential backup
D) Incremental backup
A) Hot backup
B) Full backup
C) Differential backup
D) Incremental backup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
72
How does a standardized change management process decrease risk?
A) By controlling the identification of changes to a system
B) By controlling the implementation of changes to a system
C) By ensuring that changes are reviewed appropriately before being finalized
D) All answer choices are correct.
A) By controlling the identification of changes to a system
B) By controlling the implementation of changes to a system
C) By ensuring that changes are reviewed appropriately before being finalized
D) All answer choices are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
73
In which change management environment does a developer write code to make the change in the system?
A) Test
B) Model
C) Production
D) Live
A) Test
B) Model
C) Production
D) Live
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
74
Which of the following change management steps occurs in the model environment?
A) Developer writes code.
B) Code implemented into production
C) User reviews and approves code.
D) User requests change.
A) Developer writes code.
B) Code implemented into production
C) User reviews and approves code.
D) User requests change.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
75
An emergency change request bypasses which stage of the change management process?
A) Test
B) Sandbox
C) Model
D) Production
A) Test
B) Sandbox
C) Model
D) Production
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
76
Unauthorized or incorrectly executed changes to a system may result in what kind of risk?
A) Incongruency with users
B) Incongruency of prioritization
C) Internal code irregularities
D) Internal fraud
A) Incongruency with users
B) Incongruency of prioritization
C) Internal code irregularities
D) Internal fraud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
77
Which development environment is often referred to as the sandbox because developers can test without having impact on the live systems?
A) Test
B) Model
C) Production
D) Alteration
A) Test
B) Model
C) Production
D) Alteration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
78
Which of the following change management steps occurs in the model environment?
A) User requests change.
B) Developer writes code.
C) Code implemented into production
D) User reviews and approves code.
A) User requests change.
B) Developer writes code.
C) Code implemented into production
D) User reviews and approves code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
79
Which of the stages of the formal change management process includes a recent copy of the production environment where tests are performed?
A) Test environment
B) Model environment
C) Production environment
D) Development environment
A) Test environment
B) Model environment
C) Production environment
D) Development environment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
80
Joel has developed new code and implemented it into the model environment so that the user can test it to see if it works as required. What stage in the change management process is Joel preparing for?
A) User acceptance testing
B) User code review
C) User developer check
D) User production run
A) User acceptance testing
B) User code review
C) User developer check
D) User production run
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck