Identify Components Of IT Infrastructure
Help Questions
CPA Information Systems and Controls (ISC) › Identify Components Of IT Infrastructure
In an IT infrastructure audit of a nonprofit organization, the auditor reviews how internal users access payroll and donor management systems hosted in a private data centre. Management wants a centralized service to create, modify, and disable user accounts and group memberships to support access governance and timely deprovisioning. What is the primary role of the component that provides this capability in the IT infrastructure?
A legacy token-ring network that improves throughput for modern cloud applications
A directory service that centrally manages user identities, groups, and authentication policies
A web application firewall that filters malicious web requests before they reach applications
A tape drive that archives monthly reports for long-term storage
Explanation
This question tests understanding of identity and access management components in IT infrastructure. The scenario requires centralized management of user accounts and group memberships to support access governance and timely deprovisioning across multiple systems. A directory service (B) like Active Directory or LDAP provides this centralized identity management, storing user accounts, groups, and authentication policies in a hierarchical database that multiple systems can query. Web application firewalls (A) filter malicious web traffic but don't manage user identities. Tape drives (C) provide archival storage without identity management capabilities. Token-ring networks (D) are obsolete LAN technologies unrelated to modern cloud applications or identity management. When evaluating access governance requirements, identify components that centralize identity lifecycle management and provide single-source-of-truth for user authentication and authorization across enterprise systems.
A government agency is conducting an IT security assessment of its public-facing permit application portal hosted in a demilitarized zone (DMZ). The agency wants to reduce the risk of internet-based attacks by filtering inbound and outbound traffic based on defined rules and logging blocked connections. Which IT infrastructure component is most directly responsible for this traffic filtering function?
A file server that stores user documents on shared folders
A spreadsheet macro that automates monthly reporting tasks
A firewall that enforces network access rules by allowing or blocking traffic between network zones
A fax modem that transmits scanned forms over analog phone lines
Explanation
This question assesses knowledge of network security components, specifically perimeter defense mechanisms. The scenario describes a public-facing application in a DMZ requiring protection from internet-based attacks through traffic filtering and logging. A firewall (A) is the primary infrastructure component designed for this purpose, enforcing network access rules by inspecting packets and allowing or blocking traffic based on configured policies while maintaining detailed logs. File servers (B) store documents but don't filter network traffic. Fax modems (C) transmit documents over phone lines without network security functions. Spreadsheet macros (D) automate calculations within applications but don't control network traffic. For network security architecture, recognize that firewalls serve as the fundamental enforcement point for traffic filtering between network zones, particularly at internet boundaries.
As part of a system upgrade proposal, a nonprofit reviews its internet connectivity because video meetings and cloud-based finance applications frequently drop during peak hours. Management wants a more reliable and higher-capacity connection to support business operations and reduce downtime risk. Based on the scenario, which IT infrastructure component needs upgrading?
A local keyboard and mouse set used by the accounting team
A paper filing cabinet used for storing printed invoices
A legacy dial-up connection as the primary method for modern cloud access
The wide area network (WAN) internet circuit bandwidth to support higher volumes of cloud and collaboration traffic
Explanation
This question tests understanding of network infrastructure capacity planning. The scenario describes insufficient internet bandwidth causing video meetings and cloud applications to drop during peak usage, requiring a more reliable, higher-capacity connection. The WAN internet circuit bandwidth (A) is the component needing upgrade because modern cloud services and video collaboration require significantly more bandwidth than legacy applications, and insufficient capacity directly causes the described service disruptions. Keyboards and mice (B) are local input devices unrelated to network capacity. Dial-up connections (C) provide extremely limited bandwidth unsuitable for cloud access. Paper filing cabinets (D) store physical documents without affecting network performance. When evaluating connectivity upgrades, assess bandwidth requirements for cloud services, video conferencing, and concurrent users to determine appropriate circuit capacity.
During disaster recovery planning for a private company, management wants to ensure critical systems can be restored even if the primary data centre is unavailable. They plan to keep copies of backups in a separate geographic location to reduce the impact of a local disaster. Which component is essential to meet this offsite recovery requirement?
A spreadsheet access password that replaces the need for backups
A local recycle bin on each workstation for deleted files
Offsite backup storage (such as a secure cloud repository or secondary site) that holds backup copies outside the primary location
A legacy token-based ring network that prevents natural disasters
Explanation
This question evaluates knowledge of disaster recovery infrastructure components, specifically offsite backup strategies. The scenario requires backup copies in a separate geographic location to enable recovery if the primary data center is unavailable due to local disaster. Offsite backup storage (A) such as cloud repositories or secondary sites directly addresses this requirement by maintaining backup copies outside the primary location's disaster impact zone. Local recycle bins (B) only store recently deleted files on individual workstations without offsite protection. Token-ring networks (C) are obsolete LAN technologies that cannot prevent disasters. Spreadsheet passwords (D) control file access but don't replace backup requirements. For comprehensive disaster recovery, recognize offsite backup storage as essential for protecting against site-wide disasters and ensuring business continuity.
As part of an IT security assessment of a public company, the auditor notes that users connect from home to access internal finance applications hosted on the corporate network. Management wants an encrypted tunnel over the internet so remote traffic is protected in transit and access is controlled according to security policies. Which component is essential for providing this secure remote connectivity?
A local printer spooler that encrypts all internet traffic by default
A virtual private network (VPN) gateway that encrypts remote connections and authenticates users before network access
A network hub that broadcasts remote traffic to all internal devices
A fax machine that transmits login credentials securely over phone lines
Explanation
This question tests understanding of secure remote access technologies in IT infrastructure. The scenario requires encrypted connections for remote users accessing internal applications over the internet with controlled access per security policies. A VPN gateway (A) provides this capability by creating encrypted tunnels between remote devices and the corporate network, authenticating users before granting access and applying security policies. Network hubs (B) broadcast traffic locally without encryption or remote access capabilities. Fax machines (C) transmit documents over phone lines but don't secure network connections. Printer spoolers (D) queue print jobs locally without encrypting internet traffic. When implementing secure remote access, identify VPN technology as the standard solution for creating encrypted connections over untrusted networks while maintaining access controls.
In an IT infrastructure audit of a public company, the auditor reviews how employee laptops receive IP addresses and network settings when connecting to the corporate network. Management wants a centralized component that automatically assigns IP addresses and reduces configuration errors to align with IT operations standards. What is the primary role of the component that provides this service?
A physical lock on the server room door that prevents network misconfiguration
A database server that stores user passwords in plain text for easy retrieval
A dynamic host configuration protocol (DHCP) server that automatically assigns IP addresses and network parameters to devices
A legacy infrared file transfer device that replaces wired networking
Explanation
This question tests knowledge of network infrastructure services, specifically automatic IP address management. The scenario requires centralized assignment of IP addresses and network parameters to reduce configuration errors and support IT operations standards. A DHCP server (A) provides this service by automatically assigning IP addresses, subnet masks, default gateways, and DNS servers to devices when they connect to the network, eliminating manual configuration. Database servers storing passwords in plain text (B) represent poor security practice unrelated to IP management. Infrared file transfer devices (C) are obsolete short-range technologies that don't replace networking. Physical locks (D) secure facilities but don't configure network settings. For network administration efficiency, identify DHCP as the standard protocol for automatic network configuration, reducing errors and administrative overhead.
In a system upgrade proposal for a nonprofit, the IT team reviews aging on-premises servers that host the donor database and internal file shares. The servers are approaching end-of-support, increasing operational risk and limiting the ability to apply security patches in line with governance expectations. Based on the scenario, which IT infrastructure component needs upgrading?
A manual sign-in sheet at reception used to track visitors
A word processing template used for donor thank-you letters
A floppy disk inventory used for historical data transfers
The server operating system platform on the on-premises servers to ensure vendor support and security patching
Explanation
This question assesses knowledge of IT infrastructure lifecycle management, specifically server operating system components. The scenario describes aging servers approaching end-of-support, which increases operational risk and prevents security patching per governance requirements. The server operating system platform (A) is the component needing upgrade because unsupported operating systems cannot receive critical security updates, exposing the organization to vulnerabilities. Word processing templates (B) support document creation but aren't infrastructure components. Floppy disk inventories (C) track obsolete media unrelated to server support. Manual sign-in sheets (D) provide physical access logs but don't affect server patching. When evaluating infrastructure upgrade needs, prioritize components reaching end-of-support status as they pose significant security and compliance risks.
A government agency conducts an IT security assessment and identifies that staff frequently reuse passwords across systems. Management wants to reduce account takeover risk by enforcing additional verification during sign-in and by requiring stronger credential handling. Which IT infrastructure component is most vulnerable to security threats if it is misconfigured or not properly protected, given it stores and validates user credentials for many systems?
A compact disc (CD) jukebox used for long-term archival storage
A workstation wallpaper policy that enforces encryption for all user accounts
A directory service controller that centralizes authentication and authorization for multiple systems
A network printer that produces physical copies of reports
Explanation
This question assesses understanding of authentication infrastructure vulnerabilities and security risks. The scenario identifies password reuse across systems and asks which component is most vulnerable if misconfigured, given its role in storing and validating credentials for multiple systems. A directory service controller (A) like Active Directory Domain Controller is indeed the most critical component because it centralizes authentication for many systems - if compromised, attackers gain access to all integrated applications. Network printers (B) produce output but don't store authentication credentials. CD jukeboxes (C) provide archival storage without authentication functions. Wallpaper policies (D) standardize desktop appearance but don't enforce encryption or manage accounts. When assessing authentication infrastructure risks, recognize directory service controllers as high-value targets requiring stringent security controls due to their central role in enterprise authentication.
During an IT efficiency evaluation at a nonprofit, users report frequent delays when accessing an internal web application. The application is hosted on multiple identical web servers, and management wants to distribute incoming requests to improve performance and reduce single points of failure. Which component is essential for distributing this traffic across servers?
A legacy serial port switch that increases internet bandwidth
A load balancer that routes incoming application requests across multiple servers based on defined rules
A tape vaulting service that stores backup media offsite
A password manager that automatically assigns IP addresses to servers
Explanation
This question evaluates understanding of load balancing technology in IT infrastructure. The scenario describes a web application hosted on multiple servers experiencing performance issues, requiring traffic distribution to improve response times and eliminate single points of failure. A load balancer (A) provides this functionality by intelligently routing incoming requests across available servers based on algorithms like round-robin, least connections, or server health. Tape vaulting services (B) store backup media offsite but don't distribute application traffic. Serial port switches (C) are legacy connectivity devices unrelated to internet bandwidth or load distribution. Password managers (D) store credentials but don't assign IP addresses or route traffic. When designing scalable application architectures, recognize load balancers as essential components for distributing workloads, improving performance, and providing failover capabilities.
As part of a system upgrade proposal, a private company reviews its data storage for an analytics platform that is running out of capacity and experiencing slow read/write performance. Management wants scalable storage that supports redundancy and improved throughput for multiple servers. Based on the scenario, which IT infrastructure component needs upgrading?
A storage area network (SAN) that provides centralized, high-performance shared storage to servers
A legacy ZIP drive used for transferring large datasets between departments
A fax server that routes scanned invoices to email
A workstation screensaver policy that reduces server disk utilization
Explanation
This question assesses knowledge of enterprise storage infrastructure components. The scenario describes an analytics platform experiencing capacity constraints and performance issues, requiring scalable storage with redundancy and improved throughput for multiple servers. A Storage Area Network (SAN) (A) provides this capability through dedicated high-speed networks connecting servers to centralized storage arrays, offering features like RAID redundancy, dynamic allocation, and multi-path I/O for performance. Fax servers (B) route documents but don't provide data storage. ZIP drives (C) are obsolete removable media with limited capacity. Screensaver policies (D) secure workstations but don't affect server storage. For enterprise storage requirements, identify SAN technology as the solution for centralized, high-performance, scalable storage supporting multiple servers with advanced features.