Identify Components Of IT Infrastructure

Help Questions

CPA Information Systems and Controls (ISC) › Identify Components Of IT Infrastructure

Questions 1 - 10
1

In an IT infrastructure audit of a nonprofit organization, the auditor reviews how internal users access payroll and donor management systems hosted in a private data centre. Management wants a centralized service to create, modify, and disable user accounts and group memberships to support access governance and timely deprovisioning. What is the primary role of the component that provides this capability in the IT infrastructure?

A legacy token-ring network that improves throughput for modern cloud applications

A tape drive that archives monthly reports for long-term storage

A web application firewall that filters malicious web requests before they reach applications

A directory service that centrally manages user identities, groups, and authentication policies

Explanation

This question tests understanding of identity and access management components in IT infrastructure. The scenario requires centralized management of user accounts and group memberships to support access governance and timely deprovisioning across multiple systems. A directory service (B) like Active Directory or LDAP provides this centralized identity management, storing user accounts, groups, and authentication policies in a hierarchical database that multiple systems can query. Web application firewalls (A) filter malicious web traffic but don't manage user identities. Tape drives (C) provide archival storage without identity management capabilities. Token-ring networks (D) are obsolete LAN technologies unrelated to modern cloud applications or identity management. When evaluating access governance requirements, identify components that centralize identity lifecycle management and provide single-source-of-truth for user authentication and authorization across enterprise systems.

2

In an IT infrastructure audit of a public company, the auditor reviews how employee laptops receive IP addresses and network settings when connecting to the corporate network. Management wants a centralized component that automatically assigns IP addresses and reduces configuration errors to align with IT operations standards. What is the primary role of the component that provides this service?

A physical lock on the server room door that prevents network misconfiguration

A legacy infrared file transfer device that replaces wired networking

A database server that stores user passwords in plain text for easy retrieval

A dynamic host configuration protocol (DHCP) server that automatically assigns IP addresses and network parameters to devices

Explanation

This question tests knowledge of network infrastructure services, specifically automatic IP address management. The scenario requires centralized assignment of IP addresses and network parameters to reduce configuration errors and support IT operations standards. A DHCP server (A) provides this service by automatically assigning IP addresses, subnet masks, default gateways, and DNS servers to devices when they connect to the network, eliminating manual configuration. Database servers storing passwords in plain text (B) represent poor security practice unrelated to IP management. Infrared file transfer devices (C) are obsolete short-range technologies that don't replace networking. Physical locks (D) secure facilities but don't configure network settings. For network administration efficiency, identify DHCP as the standard protocol for automatic network configuration, reducing errors and administrative overhead.

3

A government agency is performing an IT efficiency evaluation and finds that many internal applications are hosted on underutilized physical servers. Management wants to improve hardware utilization and simplify provisioning while maintaining appropriate controls over workloads. How does the key infrastructure component contribute to overall IT efficiency in this scenario?

Manual re-entry of data into multiple systems to reduce integration complexity

Server virtualization that consolidates workloads onto fewer physical servers and enables faster provisioning of new systems

Use of dial-up networking to limit bandwidth and reduce server load

Disabling system logs to improve performance by eliminating audit trails

Explanation

This question tests understanding of how virtualization technology improves IT efficiency. The scenario describes underutilized physical servers that management wants to consolidate while maintaining workload controls. Server virtualization (A) directly improves efficiency by consolidating multiple workloads onto fewer physical servers, increasing hardware utilization from typical 15-20% to 60-80%, while enabling rapid provisioning through template-based deployment. Manual data re-entry (B) increases errors and labor without improving infrastructure efficiency. Dial-up networking (C) severely limits bandwidth and would decrease efficiency. Disabling system logs (D) eliminates audit trails required for compliance and troubleshooting. When evaluating IT efficiency improvements, recognize server virtualization as a transformative technology that reduces hardware costs, power consumption, and administrative overhead while improving agility.

4

In an IT infrastructure audit at a public company, the auditor evaluates how software updates are distributed to employee endpoints. Management wants a centralized mechanism to deploy approved patches consistently and to report patch compliance, supporting IT governance and security standards. Which component is essential to manage this patch deployment process?

An endpoint patch management system that deploys approved updates and reports compliance across devices

A document retention policy that automatically installs patches on endpoints

A legacy floppy disk distribution process for monthly operating system updates

A network hub that distributes software updates by broadcasting them to all devices

Explanation

This question assesses knowledge of endpoint management infrastructure components. The scenario requires centralized deployment of approved patches with compliance reporting to support IT governance and security standards. An endpoint patch management system (A) provides these capabilities by maintaining a central repository of approved patches, deploying them according to defined schedules, and generating compliance reports showing patch status across all managed devices. Network hubs (B) broadcast traffic but don't distribute software updates intelligently. Floppy disk distribution (C) is an obsolete, manual, and unreliable method for modern patching. Document retention policies (D) govern information lifecycle but don't install software. For enterprise patch management, identify centralized systems that automate deployment, ensure consistency, and provide visibility into patch compliance across the endpoint population.

5

As part of a system upgrade proposal, a public company evaluates performance issues in its data centre where multiple virtual machines run financial reporting applications on shared physical hosts. Management wants to increase computing capacity without purchasing separate physical servers for each application. Based on the scenario, which IT infrastructure component is the focus of this consolidation approach?

A tape rotation schedule that determines how often backup tapes are reused

A personal firewall installed on each user’s smartphone to block all internet access

A dot-matrix printer that produces multi-part forms for accounts payable

A virtualization hypervisor that allows multiple virtual machines to run on the same physical server hardware

Explanation

This question evaluates understanding of server virtualization technology in modern IT infrastructure. The scenario describes multiple applications running on shared physical hosts with a need to increase capacity without purchasing separate servers for each application. A virtualization hypervisor (A) enables this consolidation by abstracting physical hardware and allowing multiple virtual machines to share the same physical server resources efficiently. Tape rotation schedules (B) manage backup media lifecycle but don't address server consolidation. Dot-matrix printers (C) are legacy output devices unrelated to server capacity. Personal firewalls on smartphones (D) provide endpoint security but don't consolidate server workloads. When evaluating server infrastructure efficiency, recognize virtualization as the key technology enabling hardware consolidation, resource optimization, and rapid provisioning of new systems.

6

During disaster recovery planning for a private company’s customer billing system, management wants near-real-time copies of critical data at a secondary site to reduce recovery point objectives. The environment includes database servers, storage arrays, and a dedicated network link between sites. Which component is essential to keep data synchronized between the primary and secondary locations?

Data replication technology that continuously or frequently copies changed data to a secondary site

A local printer queue that stores print jobs until a printer is available

A compact cassette tape recorder used for manual data export

A password rotation policy that copies database records to another site automatically

Explanation

This question evaluates understanding of data replication technologies for disaster recovery. The scenario requires near-real-time data synchronization between primary and secondary sites to minimize recovery point objectives for a billing system. Data replication technology (A) provides this capability through continuous or frequent copying of changed data blocks or database transactions to the secondary site, ensuring minimal data loss if failover is required. Printer queues (B) temporarily store print jobs but don't replicate data between sites. Cassette tape recorders (C) are obsolete manual recording devices unsuitable for automated replication. Password rotation policies (D) enhance security but don't copy data between locations. For disaster recovery with aggressive recovery point objectives, identify real-time or near-real-time replication as essential for maintaining synchronized data copies across sites.

7

A private company performs an IT efficiency evaluation and finds that employees spend significant time searching for the latest versions of policies and procedures stored across shared drives. Management wants a centralized platform with version control and access permissions to improve document management and reduce duplication. Which component is essential to support this improvement?

A document management system that centralizes files with version control, permissions, and search capabilities

A legacy magnetic tape drive used as the primary location for daily document editing

A network switch that stores document versions in its routing table

A password policy that automatically merges duplicate documents across all folders

Explanation

This question tests understanding of content management infrastructure components. The scenario describes inefficient document management with employees struggling to find current versions across multiple shared drives, requiring centralization with version control and permissions. A document management system (A) provides these capabilities through a centralized repository that maintains version history, enforces access permissions, enables full-text search, and prevents duplication through check-in/check-out workflows. Network switches (B) forward packets but don't store documents or manage versions. Magnetic tape drives (C) provide sequential access unsuitable for daily document editing. Password policies (D) enforce authentication requirements but don't merge documents. For improving document management efficiency, identify dedicated systems that centralize content, automate version control, and provide structured access to organizational knowledge.

8

In a system upgrade proposal for a nonprofit, the IT team reviews aging on-premises servers that host the donor database and internal file shares. The servers are approaching end-of-support, increasing operational risk and limiting the ability to apply security patches in line with governance expectations. Based on the scenario, which IT infrastructure component needs upgrading?

A floppy disk inventory used for historical data transfers

The server operating system platform on the on-premises servers to ensure vendor support and security patching

A word processing template used for donor thank-you letters

A manual sign-in sheet at reception used to track visitors

Explanation

This question assesses knowledge of IT infrastructure lifecycle management, specifically server operating system components. The scenario describes aging servers approaching end-of-support, which increases operational risk and prevents security patching per governance requirements. The server operating system platform (A) is the component needing upgrade because unsupported operating systems cannot receive critical security updates, exposing the organization to vulnerabilities. Word processing templates (B) support document creation but aren't infrastructure components. Floppy disk inventories (C) track obsolete media unrelated to server support. Manual sign-in sheets (D) provide physical access logs but don't affect server patching. When evaluating infrastructure upgrade needs, prioritize components reaching end-of-support status as they pose significant security and compliance risks.

9

A government agency conducts an IT security assessment and identifies that staff frequently reuse passwords across systems. Management wants to reduce account takeover risk by enforcing additional verification during sign-in and by requiring stronger credential handling. Which IT infrastructure component is most vulnerable to security threats if it is misconfigured or not properly protected, given it stores and validates user credentials for many systems?

A network printer that produces physical copies of reports

A compact disc (CD) jukebox used for long-term archival storage

A workstation wallpaper policy that enforces encryption for all user accounts

A directory service controller that centralizes authentication and authorization for multiple systems

Explanation

This question assesses understanding of authentication infrastructure vulnerabilities and security risks. The scenario identifies password reuse across systems and asks which component is most vulnerable if misconfigured, given its role in storing and validating credentials for multiple systems. A directory service controller (A) like Active Directory Domain Controller is indeed the most critical component because it centralizes authentication for many systems - if compromised, attackers gain access to all integrated applications. Network printers (B) produce output but don't store authentication credentials. CD jukeboxes (C) provide archival storage without authentication functions. Wallpaper policies (D) standardize desktop appearance but don't enforce encryption or manage accounts. When assessing authentication infrastructure risks, recognize directory service controllers as high-value targets requiring stringent security controls due to their central role in enterprise authentication.

10

As part of an IT security assessment of a public company, the auditor notes that users connect from home to access internal finance applications hosted on the corporate network. Management wants an encrypted tunnel over the internet so remote traffic is protected in transit and access is controlled according to security policies. Which component is essential for providing this secure remote connectivity?

A local printer spooler that encrypts all internet traffic by default

A fax machine that transmits login credentials securely over phone lines

A virtual private network (VPN) gateway that encrypts remote connections and authenticates users before network access

A network hub that broadcasts remote traffic to all internal devices

Explanation

This question tests understanding of secure remote access technologies in IT infrastructure. The scenario requires encrypted connections for remote users accessing internal applications over the internet with controlled access per security policies. A VPN gateway (A) provides this capability by creating encrypted tunnels between remote devices and the corporate network, authenticating users before granting access and applying security policies. Network hubs (B) broadcast traffic locally without encryption or remote access capabilities. Fax machines (C) transmit documents over phone lines but don't secure network connections. Printer spoolers (D) queue print jobs locally without encrypting internet traffic. When implementing secure remote access, identify VPN technology as the standard solution for creating encrypted connections over untrusted networks while maintaining access controls.

Page 1 of 3