100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
IT Service Delivery and Support Exam Questions and Answers Latest Update Graded A+ $7.99   Add to cart

Exam (elaborations)

IT Service Delivery and Support Exam Questions and Answers Latest Update Graded A+

 1 view  0 purchase
  • Course
  • IT Infrastructure
  • Institution
  • IT Infrastructure

IT Service Delivery and Support Exam Questions and Answers Latest Update Graded A+ A database administrator has detected a performance problem with some tables which could be solved through denormalization. This situation will increase the risk of: A. concurrent access. B. deadlocks. C. unauth...

[Show more]

Preview 4 out of 73  pages

  • October 11, 2024
  • 73
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • IT Infrastructure
  • IT Infrastructure
avatar-seller
TutorJosh
IT Service Delivery and Support Exam Questions and Answers Latest Update Graded A+

A database administrator has detected a performance problem with some tables which

could be solved through denormalization. This situation will increase the risk of:

A. concurrent access.

B. deadlocks.

C. unauthorized access to data.

D. a loss of data integrity. - Answers D. A loss of data integrity.



Answer: D



Answer: D

Explanation:

Normalization is the removal of redundant data elements from the database structure.

Disabling normalization in relational databases will create redundancy and a risk of not

maintaining consistency of data, with the consequent loss of data integrity. Deadlocks are

not caused by denormalization. Access to data is controlled by defining user rights to

information, and is not affected by denormalization.

For locations 3a, 1d and 3d, the diagram indicates hubs with lines that appear to be open

and active. Assuming that is true, what control, if any, should be recommended to mitigate

this weakness?

A. Intelligent hub

B. Physical security over the hubs

C. Physical security and an intelligent hub

D. No controls are necessary since this is not a weakness - Answers C. Physical security and an intelligent
hub.

,Answer: C

Explanation:

Open hubs represent a significant control weakness because of the potential to access a

network connection easily. An intelligent hub would allow the deactivation of a single port

while leaving the remaining ports active. Additionally, physical security would also provide

reasonable protection over hubs with active ports.

When performing a database review, an IS auditor notices that some tables in the

database are not normalized. The IS auditor should next:

A. recommend that the database be normalized.

B. review the conceptual data model.

C. review the stored procedures.

D. review the justification. - Answers D. Review the justification.



Answer: D

Explanation:

If the database is not normalized, the IS auditor should review the justification since, in

some situations, denormalization is recommended for performance reasons. The IS auditor

should not recommend normalizing the database until further investigation takes place.

Reviewing the conceptual data model or the stored procedures will not provide information

about normalization

Which of the following types of firewalls provide the GREATEST degree and granularity of

control?

A. Screening router

B. Packet filter

C. Application gateway

,D. Circuit gateway - Answers C. Application gateway

Answer: C

Explanation:

The application gateway is similar to a circuit gateway, but it has specific proxies for each

service. To handle web services, it has an HTTP proxy that acts as an intermediary

between externals and internals, but is specifically for HTTP. This meansthat it not only

checks the packet IP addresses (layer 3) and the ports it is directed to (in this case port 80,

or layer 4), it also checks every HTTP command (layers 5 and 7). Therefore, it works in a

more detailed (granularity) way than the others. Screening router and packet filter (choices

A and BJ work at the protocol, service and/or port level. This means that they analyze

packets from layers 3 and 4, and not from higher levels. A circuit gateway (choice D) is

based on a proxy or programthat acts as an intermediary between external and internal

accesses. This means that during an external access, instead of opening a single

connection to the internal server, two connections are established-one from the external

server to the proxy(which conforms the circuit-gateway) and one from the proxy to the

internal server. Layers 3 and 4 (IP and TCP) and some general features from higher

protocols are used to perform these tasks.

When reviewing system parameters, an IS auditor's PRIMARY concern should be that:

A. they are set to meet security and performance requirements.

B. changes are recorded in an audit trail and periodically reviewed.

C. changes are authorized and supported by appropriate documents.

D. access to parameters in the system is restricted. - Answers A. They are set to meet security and
performance requirements.



Answer: A

Explanation:

, The primary concern is to find the balance between security and performance. Recording

changes in an audit trail and periodically reviewing them is a detective control; however, if

parameters are not set according to business rules, monitoring of changes may not be an

effective control. Reviewing changes to ensure they are supported by appropriate

documents is also a detective control, if parameters are set incorrectly, the related

documentation and the fact that these are authorized does not reduce the impact.

Restriction of access to parameters ensures that only authorized staff can access the

parameters; however, if the parameters are set incorrectly, restricting access will still have

an adverse impact.

When reviewing the configuration of network devices, an IS auditor should FIRST identify:

A. the best practices for the type of network devices deployed.

B. whether components of the network are missing.

C. the importance of the network device in the topology.

D. whether subcomponents of the network are being used appropriately. - Answers C. The importance
of the network device in the topology.



Answer: C



Explanation:

The first step is to understand the importance and role of the network device within the

organization's network topology. After understanding the devices in the network, the best

practice for using the device should be reviewed to ensure that there are no anomalies

within the configuration. Identification of which component or subcomponent is missing or

being used inappropriately can only be known upon reviewing and understanding the

topology and the best practice for deployment of the device in the network.

Which of the following is the BEST audit procedure to determine if a firewall is configured in

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller TutorJosh. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75632 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart