MIS 3315 Test 2 (Weeks 6-8)
Each ____________ is at least one physical facility with independent infrastructure for networking, power, cooling, and facility operations.
Available zone
_________ has been a leader in ERP systems for over 25 years, with a primary focus in manufacturing, distribution, retail, and services industries.
Epicor
The NIST800-34R1 audience includes the following types of personnel: ____________________ responsible for designing, implementing, or modifying information systems
System engineers and architects
_____________ are discussion-based exercises where personnel meet in a classroom setting or in breakout groups to discuss their roles during an emergency and their responses to a particular emergency situation.
Tabletop exercises
Dynamics GP is a _______ business solution for both small and large businesses.
mid-market
The cloud replaces the fixed resourcing paradigm of ____________ hardware and addresses scalability by using an elastic and flexible resource paradigm.
on-premises
Odoo is a(n) _________ ERP and CRM used by over 4 million users worldwide.
open-source
___Generation: Virtual machines (VMs) are installed and operated from a public cloud using Infrastructure as a Service (IaaS). Virtual machines are managed in a more manual way by a DevOps team in a single-tenant environment with some amount of continuous integration.
1st
____ Generation: The services offered by monolithic virtual machines are deconstructed into groups of services (as a Service Oriented Architecture or SOA) that remain as independent VMs. The DevOps team operates the VMs with orchestration tooling, supports multitenancy, and utilizes continuous delivery of new software.
2nd
The ______ is the first source for determining resiliency and contingency planning strategies.
BIA
____ is the second part of that pipeline that automatically prepares new code for use in the production system.
CD
_____ is a practice by which developers regularly integrate their code into a central code repository so that the code can be tested and approved for faster rollout into the customer-facing production application.
CI
Dynamics 365 Business Central from Microsoft was created by combining the functionalities of both Dynamics ERP and _______________ products.
CRM
___________ ERP software such as NetSuite can be internally hosted or licensed as a hosted SaaS solution.
Cloud
Any ERP Software-as-a-Service (SaaS) which is available over a Cloud-hosting service rather than on-premise deployment.
Cloud-based ERP
____________ are typically facilities with adequate space and infrastructure (electric power, telecommunications connections, and environmental controls) to support information system recovery activities.
Cold Sites
______________ preserves authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
Confidentiality
Containers are lightweight, stand-alone executable software packages that include everything needed to run, including code, system tools, binaries, libraries, frameworks, and settings.
Containers
_____________ and contingency planning are critical components of emergency management and organizational resilience but are often confused in their use.
Continuity
_________________ focuses on restoring an organization's mission essential functions (MEF) at an alternate site and performing those functions for up to 30 days before returning to normal operations.
Continuity of Operations Plan (COOP)
A _____________ is often developed by the organization responsible for public outreach. The plan provides various formats for communications appropriate to the incident.
Crisis Communications Plan (CCP)
________________ is a set of policies and procedures that serve to protect and recover these national assets and mitigate risks and vulnerabilities.
Critical Infrastructure Protection (CIP) Plan
Traditionally, _____________ managed all the installation and operation of hardware, power, cabling, upgrades, backups, migrations, and redundancy.
Customers
__________________establishes procedures to address cyber-attacks against an organization's information system(s).
Cyber Incident Response Plan (CIRP)
_____________ are databases storing large volumes of raw unstructured data that is not ready for query, which is usually lower cost than processed data ready for query.
Data lakes
______________ refer to data warehouses that contain specific subsets of data that may only apply to a specific interest of a data-driven business.
Data marts
A data ______ is an abstract way to represent data, its structure, and relationships to real-world things that it represents.
Data model
_____________ is the technology discipline that combines the disciplines of math and statistics with computer science, with the goal of harvesting value from data.
Data science
______________ relate to data that is sent in the form of ongoing telemetry, and it implies an intent to process data in a streaming flow.
Data streams
_____________ are similar to data lakes, but they are data volumes that have been processed and indexed to make them ready for query.
Data warehouses
________ learning uses artificial neural networks, which are data processing models based loosely on the functionality of nerve cells (neurons) in human biology.
Deep
____________ is a function within IT systems that bridges the gap between development and operations of systems.
DevOps
Microsoft is been a leader in the ERP software market for many years through its ________ product offerings.
Dynamics
________________ controls considerations are only for the location or building that houses the information system.
Environmental
Serverless is also known as ____________.
FaaS
One cannot access a common database from the ERP suite to get real-time details about what's simultaneously happening at your manufacturing plants abroad and distribution centers right at home.
False
Privately operated public cloud cannot also be labeled as a private cloud when an organization operates its workloads in a public cloud setting for the company's internal uses.
False
QuickBooks Online is an ERP software application.
False
SAP QBO is an in-memory data platform that is deployable as an on-premise appliance, or in the cloud.
False
Since the SAP ________ database resides entirely in-memory all the time, additional complex calculations, functions, and data-intensive operations can happen on the data directly in the database, without requiring time-consuming and costly movements of data between the database and applications.
HANA
______ helps solve the storage equation by distributing the file system across a cluster of commodity servers.
HDFS
Enterprise resource planning systems which blend on-premise and Cloud-based deployment.
Hybrid ERP
In ________ the customer decides what operating system to install, what data to store, or what application to run on those resources.
IaaS
__________ is a cloud service model in which cloud providers offer compute, storage, networking, security, and other infrastructure services in a hosted offering.
IaaS
___________ is a way to pay for the raw infrastructure, which the cloud operator oversees on your behalf.
IaaS
_________________- Realistic recovery efforts require a thorough evaluation of the resources required to resume mission/business processes and related interdependencies as quickly as possible.
Identify resource requirements
Cyber _________ Response Planning is a type of plan that normally focuses on detection, response, and recovery to a computer security incident or event.
Incident
Current Trends in ERP Software include all except:
Increased use of the "Silo" system model
__________'s ability to provide an ERP software for every industry is in part due the number of acquisitions they've been a part of since their inception in 2002 as Agilsys and ultimate rebrand in 2004.
Infor
________ system components are either purchased commercially off-the-shelf or are custom-developed and can be deployed in land-based, sea-based, airborne, and/or space-based information systems.
Information
The NIST800-34R1 audience includes the following types of personnel: ____________________ and other staff responsible for developing, implementing, and maintaining an information system's security activities
Information System Security Officers (ISSOs)/Information System Security Managers (ISSMs)
Amazon's serverless technology is called_________ ; Google and Microsoft call theirs Google Functions and Azure Functions, respectively.
Lambda
________ cloud is a reference to on-premises deployment models.
Local
Benefits of ERP Software include all except:
Low implementation costs
Recovery personnel should be trained on the following plan elements except:
Management specific processes (Activation and Notification, Recovery, and Reconstitution Phases)
______________ is a security, administration, and privacy concept that is fundamental to how the cloud (and even many non-cloud) systems work today.
Multitenancy
____________ components can include, for example, such devices as firewalls, sensors (local or remote), switches, guards, routers, gateways, wireless access points, and network appliances.
Network
_____________ databases are dynamic, less structured than RDBMS, and often more document-oriented, which gives them flexibility to evolve and scale over time.
Nonrelational
______________________ outlines first-response procedures for occupants of a facility in the event of a threat or incident to the health and safety of personnel, the environment, or property.
Occupant Emergency Plan (OEP)
This is any ERP software which is deployed directly on your in-site devices.
On-premise ERP
This solution lets you inspect, modify, and enhance your ERP source code, not just customize your business processes.
Open Source ERP
_________ is one of the largest software companies in the world, selling database software and technology, cloud engineered systems, and enterprise software products.
Oracle
A ________ bundles together computing services and other solutions that provide a more accessible framework for application development.
PaaS
_________ is cloud operator specific; it may lock you into one cloud provider's ecosystem.
PaaS
________ cloud is a preferred deployment approach for governments, financial industries, service providers, and large enterprises because it provides a higher level of control, security, and data privacy.
Private
The ______________ Phase is the third and final phase of ISCP implementation and defines the actions taken to test and validate system capability and functionality.
Reconstitution
____________ are sets of interconnected datacenters in a geographical area that are managed as an integrated group.
Regions
____________ learning is a slightly different type of learning by which the system uses a feedback system to progressively train a model by cumulative reward.
Reinforcement
In the computer networking industry, vendors that offer cloud hosted network management, location services, data analytics, or other applications are effectively providing _________.
SaaS
___________ model is effectively a finished application, built on a cloud infrastructure, and offered as a complete packaged product.
SaaS
___________ is the third-largest supplier of enterprise resource planning software, but the largest supplier to small businesses.
Sage Group
_________ learning is a type of ML in which the data model is learned with explicit labeled data. In other words, the learning is done with direct teaching by a training dataset.
Supervised
The NIST800-34R1 audience includes the following types of personnel: _________________ responsible for maintaining daily information system operations
System administrators
A third-party private cloud solution can be offered by a public cloud company, a SaaS provider, or any other hosting entities operating the service in a dedicated model.
True
ERP communication tools organize scanned documents, files, emails, texts, and phone call recordings.
True
ERP software contains applications which automates business functions like production, sales quoting, accounting, and more.
True
ERP solutions include modules that help with all facets of a business but should be prioritized based on what industry your business falls under.
True
SAP has been a leader in business applications since the launch of its first ERP system in 1972.
True
The cloud offers an alternative model for consuming IT services in which companies move away from on-premises models and toward hosted services where cloud providers offload IT operations on their behalf.
True
With SAP HANA, one doesn't need to take the time to load data from your transactional database into your reporting database, or even build traditional tuning structures to enable that reporting.
True
_____________ learning is the creation of an ML model in which the inputs are not labeled nor explicitly trained. The system learns about the data on its own and is tasked with grouping the otherwise unsorted data according to similarities/differences and patterns.
Unsupervised
It is important to use an industry-specific ERP solution because:
a general ERP system will weigh you down with unnecessary features
There are many different versions of cloud _________, and not all clouds are created equal.
architecture
Contingency planning is designed to mitigate the risk of system and service unavailability by providing effective and efficient solutions to enhance system _____________.
availability
Each region is composed of a group of separate facilities, which are called ___________.
availability zones
Perhaps the most important cost aspect is that the cloud enables customers to transition into operational expenditures instead of high upfront _____ expenditures, which are common to on-premises solutions.
capital
The cloud eases the demands of traditional deployment models by shifting the burden of operation to the ________ provider.
cloud
Information system __________ planning refers to a coordinated strategy involving plans, procedures, and technical measures that enable the recovery of information systems, operations, and data after a disruption.
contingency
End-to-end private cloud solutions are prepackaged computing stack that is typically installed on the ____________ premises.
customer's
Maintaining the integrity and security of system ________ and software is a key component in contingency planning.
data
Information systems are vulnerable to a variety of _____________, ranging from mild (e.g., short-term power outage, disk drive failure) to severe (e.g., equipment destruction, fire).
disruptions
Although it's not a cloud deployment model, __________ computing intersects with the public, private, hybrid, and local cloud discussion.
edge
Notifications sent via _________ should be done with caution because there is no way to ensure receipt and acknowledgement.
If _________ is sent offsite for storage, there should be a cryptographic key management system in place to make sure the data is readable if it needs to be recovered onto a new or replaced system.
encrypted data
Cloud deployments are typically categorized into three groups known as public, private, and________. There's also a fourth pseudocloud model, which is local cloud.
hybrid
Occasionally, organizations will use the term ________ cloud to refer to their migration period when they are moving from a private datacenter towards a public cloud.
hybrid
There are several different types of ERP designed for several ___________ in order to address their specific needs.
industries
Using ERP software, one can cut down on data duplication by keeping all your information within _______ cohesive system.
one
Modern ERP practices began in the 1990s due to the rise of computer software being integrated with daily business____________.
operations
The first traces of ERP were found in manufacturing, with the economic order quantity (EOQ) model, a __________ scheduling system.
paper-based
To be effective and to ensure that personnel fully understand the organization's contingency planning requirements, the contingency plan must be based on a clearly defined__________.
policy
When recovering a complex system, such as a wide area network (WAN) or virtual local area network (VLAN) involving multiple independent components, recovery procedures should reflect system _________ identified in the BIA.
priorities
The notification strategy should define ___________ to be followed in the event that specific personnel cannot be contacted.
procedures
Epicor ERP's strengths include the amount of data it can store and analyze, as well as the automation it can provide when it comes to __________.
production
The __________ cloud is effectively a set of services built in a datacenter that is hosted and operated by someone else.
public
Much vulnerability may be minimized or eliminated through management, operational, or technical controls as part of the organization's resiliency effort; however, it is virtually impossible to completely eliminate all ______________.
risks
By involving third parties in IT systems and operations, you will also introduce questions related to _________ and data privacy.
security
Critical infrastructure and key resources (CIKR) are those components of the national infrastructure that are deemed so vital that their loss would have a debilitating effect of the safety, _________, economy, and/or health of the United States.
security
The _______________ stage of a data pipeline is commonly the only data stage that the application user ever experiences.
visualization