System integration

Which of the following allow for filling input fields with default values or database values
Presentation Layer
Database Layer
Application Layer
Router Layer
Which of the following are not relational Database
Oracle
DB2
ERP
Access
What are disadvantages of asymmetric key crytography
Encryption algorithms are normally slower than symmetric-Key cipher
Key much longer than 1000bits
Security is based on the difficulty of factoring large numbers
All are correct
Integration of security service is...?
Easy
An option decision
Difficult and more risk than security of each component
More risk than the risk of each component
What are different types of middleware?
Point to point, broadcasting, CORBA
Message oriented middleware, Object architectures, transaction processing
Point to point, broadcast, MSMQ
Com+, CORBA, Enterprise Java Beans
Which of the following consist of a database layer, application layer, and presentation layer
DB2
ERP
SAP
AG
Another name for a relation is:
Attribute
Flat file
Table
Tuple
The simplest way to achieve load balancing is to:
Maintain a list of available servers and pass incoming requests to those servers
Distribute the load of data transfer to a single server with high capacity
Buy the latest load balancing software
Institute single tier architecture
Which of the following is a generic solution to the challenge of performance?
Scalable solutions
Reliable solutions
Transparent solutions
Server solutions
Evaluation of the performance of an information system is dependent on which of the following factors
Number of users and user expectations
Number of users and management expectations
Number of managers
Management expectations
What is some of important security terms?
Authentication, authorization, Audit
Authentication, access control, logging activity
Load balance, data redundancy
None is correct
What are system security architecture?
The system has enough security level
3 security architecture to protect the system
The policies, procedures, and technologies that mitigate the risk
The technologies the ensure system security
What is not an important security term?
Authorization
Security protocol
Non repudiation
Replication
What is an important issues we can get when system integrated support for electronic commerce?
Greater data
Greater security risk
Complex process
Reliable communication of information
How many architectures are there for data integration?
4
3
2
1
Authorization is... ?
The determinator of claimed identify
The determinator of access to resources
The prevention of a principal from denying participation
The rules that govern communications between principal
What take place first to ensure security system?
Automation
Authorization
Authentication
Atomicity
Which kind of technique can make sure non- repudiation?
Encryption
Decryption
Defense
Digital signatures
System should be defensed in...?
Depth better than breadth
Breadth than Depth
Depth
Depth and Breadth
What are advantages of symmetric key cryptography?
Key are relative long
Key must be replaced often
The encryption and decryption algorithms can be fast in both hardware and software
Key distribution is easy
Which are common mistake in data integration?
Creating a big new database
Integrate data at all sites
Analyzing legacy database to finish developing a new database
Testing without a sufficient set of real data
What is the main goal of database normalization?
Restructure the logical data model of a database to eliminate redundancy (1)
Reduce the potential for data anomalies (2)
Not is correct
Both (1) and (2) are correct
Which phase are emphasized in system integration life cycles?
Requirements and specification
Testing, Maintenance and Retirement
Both A and B are correct
None is correct
What need you do in requirements and specification phase when you want to integrate two systems?
Collect requirements
Identify user involve
Legacy system analysis
None is correct
Why is testing in system integration more complex than in system development?
Because design tests that are within system integrator's control
Data adhere to specificatons
Have to test all scenarios
All are correct
Why do the legacy systems need to remain in place until new systems are completely integrated?
To minimize changing
To reduce cost
For system integrated be tested in planned
To operating easier
Is process the most important choice system integration projects? Why?
Yes. Easy to control and monitor the result of project
No. The engineers who give the solutions for the problems are most important
Yes. Following the process will get the right solutions
No. Both the engineers, who give the solutions for the problems, and process, are needed
Which factors affect to selection process for system integration?
Ability to handle rapidly changing (unstable) set of requirements
Complexity or size of product
Suitability for small development team
All are correct
How many types of integration model are there? And what are they?
4- Waterfall, Rapid Application Development, Spiral, Agile
3- Waterfall, Spiral, Agile
3- Presentation, Functional and Data Integration
Both A and C are correct
Which are the characteristics of Presentation Integration?
Database is independent and may have inconsistent information (1)
It's read only (2)
(1) and (2) are correct
None is correct
Which is advantage of Presentation Integration?
Easy to implement
Information presentation often meets user need
Legacy applications unaffected
All are correct
What can we do to have a security service?
Load balancing and data redunancy
Authenticated, access control ang logging activities
None is correct
Both A and B are correct
After data source updated, how long will the system be in the consistent state?
Real time
Near real time
One day
Based on user requirements
Choose a middleware that can enforcement of ACID properties for all intersystem transactions?
TPM(Transaction Processing Monitor)
OTM(Object- Transaction Monitor)
MTM(Message-Transaction Monitor)
All are correct
Which are common mistake in data integration?
Creating a big new database
Integrate data at all sites
Analyzing legacy database to finish developing a new database
Testing without a sufficient of real data
Which order is preferred to ensure the system defensed in depth?
Protect-Detect-Recover
Detect-Protect-Recover
Detect-Recover-Protect
Protect-Recover-Detect
What are advantages of asymmetric key cryptography?
Key is hard to distribute
Key does not have to replaced as often and distribution is easy
Key is short
Key need to replace often
What is characteristic of Symmetric-key Cryptography
Key E = Key D
Key E <> Key D
Key E and Key D are public key
None of above
{"name":"System integration", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Which of the following allow for filling input fields with default values or database values, Which of the following are not relational Database, What are disadvantages of asymmetric key crytography","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Make your own Survey
- it's free to start.