100%(15)15 out of 15 people found this document helpful
This preview shows page 292 - 294 out of 531 pages.
applications. Application services take the form of interfaces, middleware, etc. Business softwarefocuses on business processes, whereas application services bridge the gap between applicationsand thelT Infrastructure components. Infrastructure platform tools are related to core hardware andsoftware components required for development of the IT infrastructure. Systems developmenttools represent development components of the IT infrastructure development.QUESTION NO: 665 During the requirements definition phase for a database application, performance is listed as a toppriority. To access the DBMS files, which of the following technologies should be recommendedIsaca CISA: Practice Exam"Pass Any Exam. Any Time." - 292
ActualTests.comfor optimal I/O performance?A. Storage area network (SAN)B. Network Attached Storage (NAS)C. Network file system (NFS v2)D. Common Internet File System (CIFS)Answer: AExplanation:In contrast to the other options, in a SAN comprised of computers, FC switches or routers andstorage devices, there is no computer system hosting and exporting its mounted file system forremote access, aside from special file systems. Access to information stored on the storagedevices in a SAN is comparable to direct attached storage, which means that each block of dataon a disk can be addressed directly, since the volumes of the storage device are handled asthough they are local, thus providing optimal performance. The other options describetechnologies in which a computer (or appliance) shares its information with other systems. Toaccess the information, the complete file has to be read.QUESTION NO: 666 Reverse proxy technology for web servers should be deployed if:A. http servers' addresses must be hidden.B. accelerated access to all published pages is required.C. caching is needed for fault tolerance.D. bandwidth to the user is limited.Answer: AExplanation:Reverse proxies are primarily designed to hide physical and logical internal structures from outsideaccess. Complete URLs or URIs can be partially or completely redirected without disclosing whichinternal or DMZ server is providing the requested datA . This technology might be used if a trade-off between security, performance and costs has to be achieved. Proxy servers cache some databut normally cannot cache all pages to be published because this depends on the kind ofinformation the web servers provide. The ability to accelerate access depends on the speed of theback-end servers, i.e., those that are cached. Thus, without making further assumptions, a gain inspeed cannot be assured, but visualization and hiding of internal structures can. If speed is anissue, a scale-out approach (avoiding adding additional delays by passing firewalls, involving moreservers, etc.) would be a better solution. Due to the limited caching option, reverse proxies are notsuitable for enhancing fault tolerance. User requests that are handled by reverse proxy servers areusing exactly the same bandwidth as direct requests to the hosts providing the data.