CPA Business Environment and Concepts (BEC) › Information Technology
______ is a way of distributing software through applications hosted by a vendor and made available to customers over the web.
Software as a service
Platform as a service
Infrastructure as a service
IT as a service
IT as a service is not a term, software as a service relates to applications hosted by a vendor, and platform as a service allows customers to host their own applications.
______ is a way of distributing software through applications hosted by a vendor and made available to customers over the web.
Software as a service
Platform as a service
Infrastructure as a service
IT as a service
IT as a service is not a term, software as a service relates to applications hosted by a vendor, and platform as a service allows customers to host their own applications.
Which of the following types of business planning focuses on how a company can most effectively restore business operations following a disaster?
Capacity planning
Budget planning
Strategy planning
Continuity planning
Business continuity planning focuses on restoring and continuing operations in the event a disaster occurs that affects an organization.
Which of the following types of business planning focuses on how a company can most effectively restore business operations following a disaster?
Capacity planning
Budget planning
Strategy planning
Continuity planning
Business continuity planning focuses on restoring and continuing operations in the event a disaster occurs that affects an organization.
Which of the following best describes a hot site?
Location equipped with the necessary hardware and possibly software
Location within the company that is most vulnerable to disaster
Location that is considered too close to a potential disaster area
Location where a company can install data processing equipment on short notice
A hot site will have hardware that can be configured to be used for the processing needs of the client.
Which of the following best describes a hot site?
Location equipped with the necessary hardware and possibly software
Location within the company that is most vulnerable to disaster
Location that is considered too close to a potential disaster area
Location where a company can install data processing equipment on short notice
A hot site will have hardware that can be configured to be used for the processing needs of the client.
In which of the following locations should a copy of the accounting system data backup of year end information be stored?
Fireproof cabinet in the data network room
Secure off site location
Data backup server in the network room
Locked file cabinet in the accounting department
The accounting system data backup of year end information should be stored in some kind of secure off site location and not in any of the other locations.
In which of the following locations should a copy of the accounting system data backup of year end information be stored?
Fireproof cabinet in the data network room
Secure off site location
Data backup server in the network room
Locked file cabinet in the accounting department
The accounting system data backup of year end information should be stored in some kind of secure off site location and not in any of the other locations.
The protective device that allows private intranet users to access the Internet without allowing Internet users access to private Intranet information is called a:
Browser
Anti virus program
Password
Firewall
A firewall is a protective device that allows private intranet users to access the Internet without allowing Internet users access to private Intranet information.
The protective device that allows private intranet users to access the Internet without allowing Internet users access to private Intranet information is called a:
Browser
Anti virus program
Password
Firewall
A firewall is a protective device that allows private intranet users to access the Internet without allowing Internet users access to private Intranet information.