You are on page 1of 10

Chapter: 5

What is IT infrastructure?
Set of physical devices and software required to operate
enterprise.
2 What are the components/elements of IT Infrastructure?
a. Computing platforms providing computing services
b. Telecommunications services
c. Data management services
d. Application software services
e. Physical facilities management services
f. IT management, education, and other services
3 Service platform perspective?
Technical view and Behavioral view.
4 To develop better IT infrastructure technology, what are
factors/you consider what things?
a. Business Strategy
b. IT Strategy
c. Information Technology
5 What are the computing sources available now?
In Moors low, he said that:
a. The power of Microprocessor double in every 18
months
b. Computing power double every 18 months
c. The price of computing falls by half every 18 months
6 Traditional Economies VS. Network Economies/ Metcalfs
law?
Traditional economy maintain law of diminishing return
and the other side Network economy maintain law of
increasing returns.
7 Declining Communication cost?
As communication costs fall toward a very small number
and approach 0, utilization of communication and
computing facilities explodes.
8 What is Standards and network effects?
a. Specifications that establish the compatibility of
products and the ability to communicate in a network
b. Unleash powerful economies of scale and result in

price declines as manufacturers focus on the


products built to a single standard
9 IT infrastructure components?
a. Computer hardware platforms
b. Operating system platforms
c. Enterprise software applications
d. Data management and storage
e. Networking/telecommunications platforms
f. Internet platforms
g. Consulting system integration services
1 IT Infrastructure Eco-system?
0
a. Internet platform
b. Computer Hardware Platform
c. Operating System platform
d. Enterprise Software application platform
e. Networking /telecommunication
f. Consultants and system integrators
g. Data management and storage.
1 BYOD, Cloud computing, Green Computing?
1
I. BYOD means bring your own device.
II. Cloud computing is on demand computing. It is 3
types:
a. Hybrid
b. Private
c. public
III. Green Computing: Practices and technologies for
manufacturing, using, disposing of computing and
networking hardware
1 What are 3 external sources for software?
2
a. Software packages and enterprise software
b. Software outsourcing
c. Cloud-based software services
1 How we control IT infrastructure on this changing nature?
3
a. Flexibility
b. Scalability
Why amount to spend on IT is complex question?

a. Rent Technology if it is temporary


b. Buy Technology if it is permanent
1 How should IT department be organized?
4
a. Centralize
b. De-Centralize
1 How are costs allocated between divisions, departments?
5
We should allocate our IT infrastructure cost by collecting
requirement from each and every division. Some time we
cant divided cost equally. Example: marketing
department cost is always higher.

Chapter: 6
1

If You maintain the file traditionally, what kind of problems you should
face?
a. Data redundancy
b. Data inconsistence
c. Program data dependent
d. Lack of flexibility
e. Poor security
f. Lack of data sharing and availability
What is Database?
Serves many applications by centralizing data and controlling
redundant data
What is DBMS?
A database management system (DBMS) is system software for
creating and managing databases.
Relational DBMS?
RDBMS is the basis for SQL. Represent data as twodimensional tables, Each table contains data on entity and
attributes
What is Operations of a Relational DBMS?
a. Select
b. Join
c. Project
What is Big data?
Massive sets of unstructured/semi-structured data
from Web traffic, social media, sensors, and so on
Write down contemporary tools of business intelligence infrastructure?

9
1
0

1
1

a. Data warehouses
b. Data marts
c. Hadoop
d. In-memory computing
e. Analytical platforms
What is Data warehouse?
Stores current and historical data from many core operational
transaction systems
What is Data marts?
Subset of data warehouse
Describe about the analytical tools from business intelligence?
a. OLAP
b. Data mining
c. Text mining
d. Web mining
How do you manage on your establishing database an information
policy?
a. Data administration
b. Data governance
c. Database administration

Chapter: 7
1

What is computer network?


A computer network is a set of computers connected together for
the purpose of sharing resources.

What are the components of a simple network?


a.
b.
c.
d.

Client and server computers


Network interfaces (NICs)
Connection medium
Network operating system
e. Hubs, switches, routers

Network in large company, mention some element those whom use?


a. Hundreds of LANs
b.
c.
d.
e.

Various powerful servers


Mobile wireless LANs (Wi-Fi networks)
Videoconferencing system
Telephone network
f. Wireless cell phones

Features of Clint server computer?


a. Distributed computing model
b. Clients linked through network controlled by network server computer
c. Server sets rules of communication for network and provides every
client with an address so others can find it on the network
d. Has largely replaced centralized mainframe computing
e. The Internet: largest implementation of client/server computing

Packet switching VS. Circuit switching?

TCP/IP Model?
a. Application layer
b. Transport layer
c. Internet layer
d. Network interface layer

Digital VS. Analogue signals?

What kind of connection medium are exist ?


a. Twisted pair wire
b. Coaxial cable
c. Fiber optics cable
d. Wireless transmission

How does internet work? Write the features of IAB, W3C & ICANN?
a. IAB- Internet Architecture Board is responsible for the

1
0
1
1

management of the IETF protocol parameter registries


b. W3C- World Wide Web Consortium It develops standards
for code on the web
c. ICANN- Internet Corporation for Assigned Names and
Numbers - responsibility for Internet Protocol (IP) address
space allocation, protocol identifier assignment, generic
(gTLD) and country code (ccTLD) Top-Level Domain name
system management, and root server system
management
DNS system?
Domain Name System is a hierarchical naming system
Voip & VPN
a. Voice over IP - Digital voice communication using IP, packet switching
b. Virtual private network - Secure, encrypted, private network run over
Internet

1
2

1
3

1
4

How does Google work?


i.
User Query
ii.
Receive Google server
iii.
Request sent in Google index server
iv.
Using page rank algorithm
v.
Attach small summary
vi.
Result deliver to user
Web2 VS. Web3 ?

3G VS 4G ?

1
5

CDMA Vs GSM ?

1
6

RFID, Wifi & WiMax ?


RFID- Radio-Frequency IDentification
WiMax- Worldwide Interoperability for Microwave Access
Wifi- wireless fidelity

Chapter: 8
1

Why systems are vulnerable?


a. Accessibility of networks
b. Hardware problems (breakdowns, configuration errors, damage from
improper use or crime)
c. Software problems (programming errors, installation errors,

unauthorized changes)
d. Disasters
e. Use of networks/computers outside of firms control
f. Loss and theft of portable devices

Why Internet vulnerable?


a. Network open to anyone
b. Size of Internet means abuses can have wide impact
c. Use of fixed Internet addresses with cable / DSL modems creates fixed
targets for hackers
d. Unencrypted VOIP
e. E-mail, P2P, IM

Wireless security challenges?


a.
b.
c.
d.

Vuln access point


Misconfiguration
Inexpert using
Hackers

Types of Malware?
a. Viruses - Rogue software program that attaches itself to other software
b.
c.
d.
e.
f.

programs or data files in order to be executed


Worms - Independent programs that copy themselves from one
computer to other computers over a network.
Trojan horses - Software that appears benign but does something other
than expected.
SQL injection - Hackers submit data to Web forms that exploits site s
unprotected software and sends rogue SQL query to database.
Spyware - Small programs install themselves surreptitiously on
computers to monitor user Web surfing activity and serve up
advertising.
Key loggers - Record every keystroke on computer to steal serial
numbers, passwords, launch Internet attacks.

Hackers Vs Crackers ?

Computer Crime ?
any violations of criminal law that involve a knowledge of computer

technology for their perpetration, investigation, or prosecution.

Types of computer crimes ?


a.
b.
c.
d.
e.
f.

Identity theft
Phishing
Evil twins
Pharming
Click fraud
Cyberterrorism and Cyberwarfare

Internal threats from employee?


a. Security threats often originate inside an organization
b. Inside knowledge
c. Sloppy security procedures
d. Social engineering

1
0

Business value of security control?


a. Electronic evidence
b. Computer forensics
c. Information systems controls
Types of general controls?
a.
b.
c.
d.
e.

1
1

1
2

1
3

Software controls
Hardware controls
Computer operations controls
Data security controls
Implementation controls
f. Administrative controls
Application controls ?
a. Specific controls unique to each computerized application, such as
payroll or order processing
b. Include both automated and manual procedures
c. Ensure that only authorized data are completely and accurately
processed by that application
d. Others:
1) Input controls
2) Processing controls
3) Output controls
Security policy ?
a. Acceptable use policy (AUP)
b. Authorization policies
c. Identity management
Authentication ?
a. Password systems
b. Tokens
c. Smart cards

1
4
1
5

1
6

d. Biometric authentication
Types of Encryption ?
a. Symmetric key encryption
b. Public key encryption
Security in the cloud ?
a. Responsibility for security resides with company owning the data
b. Firms must ensure providers provides adequate protection
c. Service level agreements
Securing mobile platforms ?
a. Security policies should include and cover any special requirements for
mobile devices
b. Mobile device management tools
1. Authorization
2. Inventory records
3. Control updates
4. Lock down/erase lost devices
5. Encryption
c. Software for segregating corporate data on devices

You might also like