CISA Domain 4 - Information Systems Operations, Maintenance and Service Management
CISA Domain 4 - Information Systems Operations, Maintenance and Service Management
Consulting Services Membership Blog Career Testimonials Self-paced Learning 1800-843-7890 (IN) [email protected]
Contact us
Home / Blog / CISA / CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
Part 2 – Service Level Agreements, Operational Level Agreements, Incident and problem
Management process Submit
Part 5 – Data dictionary/Directory system, Database structure, OSI Architecture GRC Platform
Part 8 – Network Management issues, Network Management tool and Overview of Disaster Compliance (GRC) Interview
Recovery Planning (DRP)
Questions
Part 9 – Overview of Recovery Point Objective (RPO) and Recovery Time Objective (RTO), CIPP Vs. CIPT
additional parameters in defining recovery strategies and various types of recovery strategies
Roles And Responsibilities Of
Part 10 – Different recovery/Continuity/response teams and their responsibilities, overview on OT Security Professionals
back-up and restoration and the various disaster recovery testing methods
Categories
AWS TOP
CCSP
Drop us a Query | Join Webinars | Training Calendar
Checkpoint
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 1/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
CheckPoint
CISA
CISCO
CISSP
Cloud
Cloud Security
Combo Courses
CompTIA
Cyber Security
Data Privacy
Data Protection
Data Science
EC Council
Overall understanding of Domain 4
General
What is information Systems operations?
Google
What are the ways of managing IS operations?
GRC
What is IT service Management Framework (ITSM)? Iapp
Infographics
Information Security
Interview Questions
Overall understanding of the domain:
ISACA
Weightage – This domain constitutes 20 percent of the CISA exam (approximately 30
questions) ISC2
2. Knowledge of service management practices and service level management ISO/IEC 20000
ISO/IEC 27001
3. Knowledge of techniques for monitoring third-party performance and compliance with
service agreements and regulatory requirements IT Service Management
IT Services
4. Knowledge of enterprise architecture (EA)
Microsoft AZURE
5. Knowledge of the functionality of fundamental technology (e.g., hardware and network
components, system software, middleware, database management systems) Microsoft Security
Servers
7. Knowledge of IT asset management, software licensing, source code management and
inventory practices OT/ICS SECURITY
Popular Courses
8. Knowledge of job scheduling practices, including exception handling
Product Training
9. Knowledge of control techniques that ensure the integrity of system interfaces
Programming Languages
10. Knowledge of capacity planning and related monitoring tools and techniques TOP
Project Management
11. Knowledge of systems performance monitoring processes, tools and techniques (e.g., Ransomware
network analyzers, system utilization reports, load balancing)
Drop us a Query | Join Webinars | Training Calendar Sailpoint
12. Knowledge of data backup, storage, maintenance and restoration practices Security Operations Center
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 2/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
14. Knowledge of data quality (completeness, accuracy, integrity) and life cycle management Security Testing
(aging, retention) SOC
Veeam
16. Knowledge of change management, configuration management, release management and
patch management practices Veritas
Zoziel Freire
17. Knowledge of operational risks and controls related to end-user computing
18. Knowledge of regulatory, legal, contractual and insurance issues related to disaster recovery
19. Knowledge of business impact analysis (BIA) related to disaster recovery planning
20. Knowledge of the development and maintenance of disaster recovery plans (DRPs)
21. Knowledge of benefits and drawbacks of alternate processing sites (e.g., hot sites, warm sites,
cold sites)
23. Knowledge of processes used to invoke the disaster recovery plans (DRPs)
plays a critical role in ensuring that computer operations processing requirements are met,
end users are satisfied and information is processed securely
2.Management of IS operations:
Governance:
Ensures that stakeholder needs, conditions and options are evaluated to determine
balanced, agreed-on enterprise objectives to be achieved;
Overall governance is the responsibility of the board of directors under the leadership
of the chairperson.
TOP
Specific governance responsibilities may be delegated to special organizational
structures at an appropriate level, particularly in larger, complex enterprises.
Management:
Drop us a Query | Join Webinars | Training Calendar
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 3/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
Management plans, builds, runs and monitors activities in alignment with the
direction set by the governance body to achieve the enterprise objectives
IS management has the overall responsibility for all operations within the IT
department
The main objective is to improve service quality, achievement of the standard certifies
organizations as having passed auditable practices and processes in ITSM.
What are Service Level Agreements (SLAs) and Operational Level Agreements (OLAs)?
What are the tools to monitor efficiency and effectiveness of services provided?
Exception reports
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 4/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
The Service Level agreement is a contract between service provider and customer
OLA is an agreement between the internal support groups of an institution that supports
SLA
The OLA clearly depicts the performance and relationship of the internal service groups.
The main objective of OLA is to ensure that all the support groups provide the intended
Exception reports:
These automated reports identify all applications that did not successfully complete or
otherwise malfunctioned.
Using this software, the auditor can carry out tests to ensure that:
Only approved
programs access sensitive data
Software utilities that can alter data files and program libraries are used only for TOP
authorized purposes
Approved programs are run only when scheduled and, conversely, that
Drop us a Query | Join Webinars | Training Calendar
unauthorized runs do not take place
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 5/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
Operator problem reports – Manual report used by helpdesk to log computer operations
problems & resolutions
Points to remember:
o Availability reports – The report that IS auditor use to check compliance with service level
agreements (SLA) requirement for uptime
Incident management:
An Incident is an event that could lead to loss of, or disruption to, an organization’s
These incidents within a structured organization are normally dealt with by either an
Incident management is reactive and its objective is to respond to and resolve issues
Problem management:
Problem management is the process responsible for managing the lifecycle of all
The primary objectives of problem management are to prevent problems and resulting
incidents from happening, to eliminate recurring incidents, and to minimize the impact
of incidents that cannot be prevented.
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 6/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
The basic function of the help desk is to be the first, single and central point of contact for
users and to follow the incident management process
The help desk personnel must ensure that all hardware and software incidents that arise are
fully documented and escalated based on the priorities established by management
Change management:
Emergency changes
Major changes
Minor changes
Patch Management:
an area of systems management that involves acquiring, testing and installing multiple
Ensuring that patches are installed properly; testing systems after installation
Points to remember:
o Patch Management – The BEST method for preventing exploitation of system vulnerabilities
TOP
9.Release management:
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 7/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
Software release management is the process through which software is made available to
users.
The release will typically consist of a number of problem fixes and enhancements to the
service.
Minor releases: Upgrades, normally containing small enhancements and fixes. A minor
upgrade or release usually supersedes all preceding emergency fixes. Minor releases
are generally used to fix small reliability or functionality problems that cannot wait until
the next major release.
While change management is the process whereby all changes go through a robust testing
and approval process, release management is the process of actually putting the software
changes into production.
10.Quality Assurance:
QA personnel verify that system changes are authorized, tested and implemented in a
controlled manner prior to being introduced into the production environment according to a
company’s change and release management policies
aids in organizing, controlling and using the data needed by application programs.
Drop us a Query | Join Webinars | Training Calendar
A DBMS provides the facility to create and maintain a well-organized database.
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 8/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
12.DBMS Architecture:
A database architect develops and implements software to meet the needs of users. The
design of a DBMS depends on its architecture
Metadata:
the data (details/schema) of any other data (i.e. data about data)
The word ‘Meta’ is the prefix that is generally the technical term for self-referential. In
other words, we can say that Metadata is the summarized data for the contextual data.
Conceptual schema,
Internal schema
TOP
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 9/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
Data Dictionary contains an index and descriptions all of the data stored in database.
Directory describes the locations of the data and the access method
Enhancing documentation
14.Database structure:
The database structure is the collection of record type and field type definitions that comprise
your database`.
In this model there is a hierarchy of parent and child data segments. To create links
These are 1:N (one-to-many) mappings between record types represented by logical
trees
In the network model, the basic data modeling construct is called a set.
A set is formed by an owner record type, a member record type and a name.
A member record type can have that role in more than one set, so a multi-owner
relationship is allowed.
An owner record type can also be a member or owner in another set. Usually, a set
Relational
Drop us a Query |database model | Training Calendar
Join Webinars
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 10/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
In Relational database model, the data and relationships among these data are
organized in tables.
A table is a collection of rows, also known as tuples, and each tuple in a table contains
The relational model is independent from the physical implementation of the data
structure, and has many advantages over the hierarchical and network database
models. With relational databases, it is easier:
Normalization:
OSI model was developed by the International Organization for Standardization (ISO) in 1984,
and it is now considered as an architectural model for the inter-computer communications
OSI model is a reference model that describes how information from a software application in
one computer moves through a physical medium to the software application in another
computer.
The OSI (Open Systems Inter-connection) is a proof-of-concept model composed of seven TOP
The OSI model was defined in ISO/IEC 7498, which has the following parts:
Drop us a Query | Join Webinars | Training Calendar
ISO/IEC 7498-1 The Basic Model
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 11/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
Each layer is self-contained and relatively independent of the other layers in terms of its
particular function
There are seven OSI layers. Each layer has different functions. They are:
Physical Layer
Data-Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Points to remember:
o The CISA candidate will not be tested on the specifics of this standard in the exam
Physical Layer – The physical layer provides the hardware that transmits and receives the
bit stream as electrical, optical or radio signals over an appropriate medium or carrier.
Data-Link Layer – The data link layer is used for the encoding, decoding and logical
organization of data bits. Data packets are framed and addressed by this layer, which has two
sublayers
Network Layer – This layer of the assigned the IP addresses and is responsible for routing
and forwarding. This layer prepares the packets for the data link layer
Transport Layer – The transport layer provides reliable and transparent transfer of data
between end points, end-to-end error recovery and flow control.
Session Layer – The session layer controls the dialogs (sessions) between computers. It
establishes, manages and terminates the connections between the local and remote
application layers
Presentation Layer – The presentation layer converts the outgoing data into a format
acceptable by the network standard and then passes the data to the session layer (It is
responsible for translation, compression and encryption)
Application Layer – provides a standard interface for applications that must communicate
with devices on the network (e.g., print files on a network-connected printer, send an email or
store data on a file server)
Points to remember: TOP
o The OSI layer that perform error detection and encryption – Data Link layer
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 12/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
Repeaters
Switches
Hubs
Routers
Gateways
Bridges
The concepts of the OSI model are used in the design and development of organizations’
network architectures. This includes LANs, WANs, MANs and use of the public Transmission
Control Protocol/Internet Protocol (TCP/IP)-based global Internet.
LAN
WAN
Wireless networks
On-demand computing
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 13/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
interference
(2) unshielded twisted pair – More attenuation, More cross talk and more
interference
– Two insulated wires are twisted around each other, with current flowing
through them in opposite directions.
– Advantages:
a. This reduces the opportunity for cross talk
b. Cheap
c. Readily available
d. Simple to modify
– Disadvantages:
a. Easy to tap
b. Easy to splice
c. Interference and Noise
Fiber-optics systems:
pair circuits.
Optical fiber is smaller and lighter than metallic cables of the same capacity.
Points to remember:
o The method of routing traffic through split-cable facilities or duplicate-cable facilities is called
“Diverse routing”
o The type of line media that provides the BEST security for a telecommunication network is
“Dedicated lines”
17.LAN Topologies:
Star topology
Bus topology
Ring topology
TOP
18.LAN component:
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 14/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
Repeaters – physical layer devices that extend the range of a network or connect two
separatenetwork segments together
Hubs- physical layer devices that serve as the center of a star-topology network or a network
concentrator
Bridges – data link layer devices that were developed to connect LANs or create two
separateLAN or WAN network segments from a single segment to reduce collision domains
Switches – data link level devices that can divide and interconnect network segmentsand
help to reduce collision domains in Ethernet-based networks
Routers – operate at the OSI network layer by examining network addresses (i.e., routing
information encoded in an IP packet).
Gateways – are devices that are protocol converters. Typically, they connect and convert
betweenLANs and the mainframe, or between LANs and the Internet, at the application layer of
the OSI
WAN switches
Routers
Modems
Point-to-point protocol
X.25
Frame Relay
What are the network performance metrics?
Latency
Throughput
TOP
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 15/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
19.WAN components:
WAN switches – Data link layer devices used for implementing various WAN technologies such
as ATM, point-to-point frame relay and ISDN
Routers – devices that operate at the network layer of the OSI reference model and provide
an interface between different network segments on an internal network or connects the
internal
network to an external network
Modems (modulator/demodulator)
Converts computer digital signals into analog data signals and analog data back to
digital.
A main task of the modems at both ends is to maintain their synchronization so the
receiving device knows when each byte starts and ends. Two methods can be used for
this purpose:
process where transmitted data is encoded with start and stop bits, specifying the
beginning and end of each character. Asynchronous transmission works in spurts
and must insert a start bit before each data character and a stop bit at its
termination to inform the receiver where it begins and ends.
Point to point protocol – (PPP) is a data link layer communications protocol used to establish a
direct connection between two nodes. PPP is a widely available remote access solution that
supports asynchronous and synchronous links, and operates over a wide range of media.
X.25 – is a standard suite of protocols used for packet-switched communications over a wide
area network
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 16/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
Digital subscriber lines – Digital subscriber line (DSL) is a technology that transports high-
bandwidth data over a simple telephone line that is directly connected to a modem. This
allows for file-sharing, and the transmission of pictures and graphics, multimedia data, audio
and video conferencing and much more
extends a private network across a public network and enables users to send and
receive data across shared or public networks as if their computing devices were
directly connected to the private network. Applications running on an end system (PC,
smartphone etc.) across a VPN may therefore benefit from the functionality, security,
and management of the private network
VPN technology was developed to allow remote users and branch offices to access
Latency: The delay that a message or packet will experience on its way from source to
destination. A very easy way to measure latency in a TCP/IP network is to use the ping
command.
Throughput: The quantity of useful work made by the system per unit of time. In
telecommunications, it is the number of bytes per second that are passing through a channel.
Points to remember:
TOP
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 17/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
Fault Management
Performance management
Configuration management
Security management
Accounting resources
Response time
Network monitors
Downtime reports
Online monitors
Protocol analyzers
A WAN needs to be monitored and managed similarly to a LAN. ISO, as part of its communications
modeling effort (ISO/IEC 10040), has defined five basic tasks related to network management:
Fault management – Detects the devices that present some kind of technical fault
Configuration management – Allows users to know, define and change, remotely, the
configuration of any device
Accounting resources – Holds the records of the resource usage in the WAN (who uses what)
Performance management – Monitors usage levels and sets alarms when a threshold has
been surpassed
Security management – Detects suspicious traffic or users, and generates alarms accordingly
23.Network Management tools: TOP
Response Time – Identify the time necessary for a command entered by users at a terminal to
Drop us a Query | Join Webinars | Training Calendar
be answered by the host system.
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 18/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
Online Monitors – Check data transmissions accuracy and errors. Monitoring can be
performed be echo checking and status checking all transmissions, ensuring that messages
are not lost or transmitted more than one.
Protocol Analyzers – It is a diagnostic tool used for monitoring packets flowing within the
network.
Help desk reports – It is prepared by the help desk, which is staffed or supported by IT
technicians trained to handle problems occurring during normal IS usage.
DRP is an element of an internal control system established to manage availability and restore
critical processes/IT services in the event of interruption.
to recover the IT capacity of the organization in the event of a disruption are in place
DRP is a continuous process. Once the criticality of business processes and supporting IT
services, systems and data are defined, they are periodically reviewed and revisited
the ability of operations to deliver goods and services to the marketplace and to comply
location or by using different tools or processes, after the disaster has happened. DRP is
focused on restoring business operations after the disaster has taken place.
BCP often includes Non-IT aspects of the business. DRP often focuses on IT systems
TOP
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 19/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
Points to remember:
o The PRIMARY GOAL of Disaster Recovery planning and Business continuity planning should
always be – Safety of Personnel (Human safety first)
o Occupant Emergency Plan (OEP) provides the response procedures for occupants of a facility in
the event a situation poses a threat to the heal and safety of personnel
o The critical first step in disaster recovery and contingency planning is – to complete a business
impact analysis
o Disaster Recovery planning addresses the technological aspect of business continuity planning
o A disaster recovery plan for an organization should focus on reducing the length of recovery
time and the cost of recovery.
o The results of tests and drills are the BEST evidence of an organization’s disaster recovery
readiness.
o Fault-tolerant hardware is the only technology that provides continuous and uninterrupted
support in the event of a disaster or disruption
What is Recovery Point Objective (RPO) and Recovery Time Objective (RTO)?
Interruption window
Hot site
Cold site
Warm site
Reciprocal arrangements
TOP
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 20/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
Points to remember:
o The CISA candidate should be familiar with which recovery strategies would be best with
different RTO and RPO parameters.
operations.
RPO indicates the earliest point in time in which it is acceptable to recover the data. For
example, if the process can afford to lose the data up to four hours before disaster, then
the latest backup available should be up to four hours before disaster or interruption
and the transactions that occurred during the RPO period and interruption need to be
entered after recovery (known as catch-up data)
RPO effectively quantifies the permissible amount of data loss in case of disruption.
operations.
It indicates the earliest point in time at which the business operations (and supporting IT
The nearer the time requirements are to the center (0-1 hours), the higher the cost of the
recovery strategies.
If the RPO is in minutes (lowest possible acceptable data loss), then data mirroring or real-
time replication should be implemented as the recovery strategy.
If the RTO is in minutes (lowest acceptable time down), then a hot site, dedicated spare
servers (and other equipment) and clustering must be used.
The below table represents the relationship between RPO and RTO:
TOP
4 – 24 hours Cold Standby Tape backups, log shipping
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 21/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
Points to remember:
o If the Recovery point objective (RPO) is close to zero, then it means that the activity is critical and
hence the cost of maintaining the environment would be higher
o A hot site is maintained and data mirroring is implemented, where Recovery Point Objective
(RPO) is low
o The metric that describes how long it will take to recover a failed system is – Mean time to Repair
(MTTR)
Interruption window – The maximum period of time the organization can wait from the
point of failure to the critical services/applications restoration. After this time, the progressive
losses caused by the interruption are unaffordable.
Service delivery objective (SDO) – Level of services to be reached during the alternate
process mode until the normal situation is restored. This is directly related to the business
needs.
Maximum tolerable outages – Maximum time the organization can support processing
in alternate mode. After this point, different problems may arise, especially if the alternate SDO
is lower than the usual SDO, and the information pending to be updated can become
unmanageable.
27.Recovery strategies:
A recovery strategy identifies the best way to recover a system (one or many) in case of
interruption, including disaster, and provides guidance based on which detailed recovery
procedures can be developed
The criticality of the business process and the applications supporting the processes
Cost
Time required to recover
Security
TOP
Recovery strategies based on the risk level identified for recovery are as follows:
Hot sites – facilities with space and basic infrastructure and all of the IT and
Drop us a Query | Join Webinars
communications | Training
equipment Calendar
required to support the critical applications, along with
office furniture and equipment for use by the staff.
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 22/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
Warm sites – are complete infrastructures but are partially configured in terms of IT,
usually with network connections and essential peripheral equipment such as disk
drives, tape drives and controllers.
Cold sites – are facilities with the space and basic infrastructure adequate to support
resumption of operations, but lacking any IT or communications equipment, programs,
data or office support.
Points to remember:
The CISA candidate should know these recovery strategies and when to use them
An offsite information processing facility having electrical wiring, air conditioning and flooring, but
no computer or communications equipment is a Cold site
The type of offsite information processing facility is often an acceptable solution for
preparing for recovery of non-critical systems and data is a cold site
Data mirroring and parallel processing are both used to provide near-immediate
recoverability for time-sensitive systems and transaction processing
Organizations should use off-site storage facilities to maintain redundancy of current and
critical information within backup files.
An off-site processing facility should not be easily identifiable externally because easy
identification would create an additional vulnerability for sabotage
The GREATEST concern when an organization’s backup facility is at a warm site is – Timely
availability of hardware.
The GREATEST risk created by a reciprocal agreement for disaster recovery made between
two companies is – Developments may result in hardware and software incompatibility.
TOP
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 23/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
Full back-up
Incremental back-up
Differential back-up
Checklist review
Parallel test
Structured walk-through
Simulation test
Software team
Applications team
Salvage team
Communications team
Transportation team
Relocation team
Training team
Drop us a Query | Join Webinars | Training Calendar
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 24/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
Points to remember:
o The responsibility of disaster recovery relocation team is to co-ordinate the process of moving
from hot site to a new location or to the restored original location.
o The responsibility of offsite storage team is to obtain, pack and ship media and records to the
recovery facilities, as well as establishing and overseeing an offsite storage schedule.
o The responsibility of transportation team is to locate a recovery site, if one has not been
predetermined, and coordinating the transport of company employees to the recovery site.
o The responsibility of salvage team is managing the relocation project and conducting a more
detailed assessment of the damage to the facilities and equipment.
Back-up schemes:
There are three main schemes for backup:
Full back-up – This type of backup scheme copies all files and folders to the backup
media, creating one backup set (with one or more media, depending on media
capacity)
Incremental back-up – An incremental backup copies the files and folders that
changed or are new since the last incremental or full backup
Differential back-up – A differential backup will copy all files and folders that have
been added or changed since a full backup was performed. This type of backup is faster
and requires less media capacity than a full backup and requires only the last full and
differential backup sets to make a full restoration
Points to remember:
o The BEST backup strategy for a large database with data supporting online sales is – Weekly full
back-up with daily incremental back-up
Checklist review – This is a preliminary step to a real test. Recovery checklists are
distributed to all members of a recovery team to review and ensure that the checklist is
current.
Simulation test – The recovery team role plays a prepared disaster scenario without
activating processing at the recovery site.
TOP
Parallel test – The recovery site is brought to a state of operational readiness, but
operations at the primary site continue normally.
Full
Drop us interruption
a Query test – Operations
| Join Webinars | Trainingare
Calendar
shut down at the primary site and shifted to the
recovery site in accordance with the recovery plan; this is the most rigorous form of testing
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 25/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
Points to remember:
o A continuity plan test that uses actual resources to simulate a system crash to cost-effectively
obtain evidence about the plan’s effectiveness is preparedness test
o The most effective test of DRP for organisations having number of offices across a wide
geographical area is preparedness test
o The type of BCP test that requires only representatives from each operational area to meet to
review the plan is Walk-through test
Full interruption test – Operations are shut down at the primary site and shifted to the recovery site in
accordance with the recovery plan; this is the most rigorous form of testing but is expensive and
potentially
Share:
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 26/27
10/10/23, 4:40 PM CISA Domain 4 – Information Systems Operations, Maintenance And Service Management
Disclaimer: Some of the graphics on our website are from public domains and are freely available. This website may include copyright content, use
of which may not have been explicitly authorized by the copyright owner. The names, trademarks, and brands of all products are the property of
their respective owners. The certification names are trademarks of the companies that own them. This website's company, product, and service
names are solely for identification reasons. We don't own them, don't hold the copyright to them, and haven't sought any kind of permission. The use
of these names, logos, and trademarks does not indicate that they are endorsed. Please contact us for additional details.
CISSP® is a registered mark of The International Information Systems Security Certification Consortium ((ISC)2).
This website uses cookies: Our website utilizes cookies to gather information such as your IP address and browsing history, such as the websites
you've visited and the amount of time you've spent on each page, and to remember your settings and preferences. Other cookies enable us to track
Website traffic and users' interactions with the site; we use this information to analyze visitor behavior and improve the site's overall experience.
TOP
https://www.infosectrain.com/blog/cisa-domain-4-information-systems-operations-maintenance-and-service-management/#part1 27/27