IT Examiner School, Seaside, CA

Module Key Points (cont.) • Vulnerability Assessments and Penetration Tests should be performed annually • Networks handle key functions within an FI – Used for daily IT activities, e.g., email, etc. – Store Customer/FI data, e.g. databases, etc. – Link FI with Core Processor – Provide access to various applications, e.g., word, excel, etc. • Topologies take many forms & some are more complex than others • If you need assistance, contact an IT Specialist

Made with FlippingBook - Online catalogs