On Tap Cuoi Ky - HK2 - SE445 - 2023 - 2024
On Tap Cuoi Ky - HK2 - SE445 - 2023 - 2024
On Tap Cuoi Ky - HK2 - SE445 - 2023 - 2024
1
integrated across organizational boundaries in order to provide e-commerce capability,
Integration of legacy systems into common enterprise security infrastructure
5. Describe the disadvantages of the Agile software development lifecycle
a. The user may not have time to work with the developers, not suitable for systems that
require a high degree of verification and validation
b. Not suitable for systems that require a high degree of verification and validation, Non-
functional or system properties are difficult to plan
c. The user may not have time to work with the developers, Non-functional or system
properties are difficult to plan
d. Not suitable for systems that require a high degree of verification and validation, Non-
functional or system properties are difficult to plan, the user may not have time to work
with the developers
6. The technologies support for integration System are
a. RPC, Middleware, Web, DTML, HTML
b. Middleware, Web, XML, Distributed Objects
c. ODBC. LDAP, XML, Distributed Objects
d. OLE, COM+, Web, XML, Distributed Objects
7. The most important the values of Integration Heuristics
a. Do not care about the most complete
b. Build and maintain options as long as possible in the design and implementation of
complex systems
c. Choose the elements so that independent as possible
d. Simplify the components in the system if possible
8. IPSec security protocols operate at layer
a. Only in the transport layer in the OSI model
b. from 4 layer to 7 layer in OSI model
c. Network Layer in OSI model
d. All right
9. What’s the Software Development Life Cycle – SDLC?
a. Is a process to improve software products
b. Is active in a specific project plan
c. Is the time from when the software starts to form until it is no longer used anymore
d. All are correct
10. What are the main difference of the life cycles?
a. Number of stages implemented
b. Execution time of each s`tages
c. Emphasis, duration, and timing of each stages
d. All are correct
11. Building and maintaining options is an important system engineering heuristic.
Why must system engineers follow this heuristic?
a. often complex with many unanticipated problems that can arise
b. flexibility to deal with these problems
c. a and b are correct
2
d. a and b are wrong
12.Integrated Security includes
a. Firewalls, Authentication, Integrity, Nonrepudiation, Confidentiality
b. Firewalls, Authentication, Integrity, Authorization, Confidentiality
c. Firewalls, Authentication, Integrity, Authorization, Confidentiality
d. Firewalls, Nonrepudiation, Integrity, Authorization, Confidentiality, Authentication
13. Why are you integrating?
a. Adaptable systems and processes, Integrated security, Management information,
Reliable and recoverable systems, Economies of scale
b. Streamlined business processes, Replaceable components, Adaptable systems and
processes, Integrated security, Economies of scale
c. Management information, Reliable and recoverable systems, Streamlined business
processes, Replaceable components, Economies of scale
d. Adaptable systems and processes, Streamlined business processes, Management
information, Support for electronic commerce, Integrated security, Replaceable
components, Economies of scale
14. How do you select a system development life cycle for a system integration
project ?
a. Suitability for small development team, Customizability/Flexibility of approach,
Market adoption
b. Compatibility with distributed teams, Ability to handle rapidly changing (unstable) set
of requirements, Emphasis on quality measurement
c. Size of product, Implementation cost, Built-in support for prototyping
d. All are correct
15. What Integration System is the easiest to perform all models?
a. Data Integration
b. Presentation Integration
c. Functional Integration
d. a,b,c false
16. The order of the software life cycle phase
a. Preliminary Investiation, Analysic, Design, Development/Construction, Testing,
Implementation, Maintenance
b. Preliminary Investiation, Analysic, Design, Testing, Implementation, Maintenance,
Development/Construction
c. Design, Development/Construction, Testing, Implementation, Maintenance,
Development/Construction, Preliminary Investiation
d. Preliminary Investiation, Analysic, Design, Implementation, Maintenance,
17. The integrated models include
a. Presentation Integration, Security Integration, Functional Integration
b. Data Integration, Network Integration, Functional Integration
c. Functional Integration, Enviroment Integration, Presentation Integration
d. Presentation Integration, Data Integration, Functional Integration
18. System integration life cycle differs from Software Development Life Cycle are
3
a. Legacy system analysis, Testing and Dependencies
b. Legacy system analysis, Accessibility of legacy information constrains the design,
Testing and Dependencies
c. integration, adaptation and Accessibility of legacy information constrains the design,
d. stages of operation, flexibility and resilience,
19. Changes in underlying databases may affect GUI, Data may be inconsistent,
API’s may not fully support information requirements, these are the disadvantages
of the integrated model
a. Data Integration
b. Presentation Integration
c. Functional Integration
d. all right
20.The protocol for securing e-mail is
a. GPG, S/MINE
b. SHA-1, S/MINE
c. CAST-128 / IDEA/3DES
d. Kerberos, X.509
21. What are two architectures for Data Integration?
a. data exchange is used with controlled data duplication, instead of on-line update.
b. Using a data conversion system on a unified format before using or in combination
with database synchronization from the component database
c. Convert component databases into messages or use the database to extract data
elements
d. No specific architecture for data integration
22. Maintenance can be difficult and data may be inconsistent, these are the
characteristics of the integrated model
a. Data Integration and Functional Integration
b. Presentation Integration and Functional Integration
c. Data Integration and Presentation Integration
d. all right
23. Security services includes:
a. Authentication, Login, Data Confidentiality
b. Authentication, Data Integrity, Data Confidentiality
c. Authentication, Non-repudiation, Access control
d. Authentication, grant, Access control
24. When is it Appropriate to use the Presentation Integration Model
a. Presentation models are Executive dashboards or Operational status displays
b. Information presentation is through application API’s, Cannot access databases
directly
c. Integrate with an application whose only useful and implementable integration base
interface or dashboards, cannot access databases directly
d. Databases are independent – No coupling, Cannot access databases directly
25. The systems following are RPC
4
a. Sun RPC, DCE RPC, CORBA
b. Microsoft DCOM, Microsoft.NET Remoting
c. Java RMI, XML RPC, SOAP
d. All right
26. The purpose of the network integration is
a. These services must be configured to trust each other
b. Easy data exchange between services each other
c. Increase the linkages between the components in the network
d. All right
27. Please provide the name of the main styles integration systems
a. File Transfer, Shared Database, Remote Procedure Invocation, Integration Guidelines
b. File Transfer, Shared Database, Remote Procedure Invocation, Messaging
c. File integration, Shared Database, Remote Procedure Invocation, Messaging
d. Integration Guidelines, File integration, Shared Database, Remote Procedure
Invocation
28. Data Integration Common Mistakes
a. Take more storage spaces for data integration
b. High cost
c. Difficult to apply in practice
d. Testing without a sufficient set of real data, Waiting for the data analyst to finish
developing the perfect schema
29. .................................................are the fundamentals of system security
a. Authentication, access control, Login
b. Authentication, access control and Data Confidentiality
c. Authentication, access control, and auditing
d. Authentication, access control and Non-repudiation
30. How many types middles do you have?
a. Asynchronous communication, Subscribe Messaging, CORBA, ACID
b. Message Oriented Middleware, Object Architectures, Transaction Processing
c. Object Architectures, Transaction Processing. Subscribe Messaging
d. Message Oriented Middleware, Object Architectures, Transaction Process Monitors
31.Yeu need to ensure use symmetric encryption is
a. Have good encryption algorithm, there is a secret key known by the recipient / posts
and channels to distribute the secret key
b. Have a suitable channel and a secret key known by the recipient / posts
c. Have good encryption algorithm and a secret key known by the recipient / posts
d. All right
32.SSL security constraints operating on the layer
a. Network, Transport
b. Network, Session
c. Application, Session
d. a, b and c ware wrong
33. When were Architectural mismatches found ?
5
a. integrated Story Systems
b. integrated analytical systems
c. integrated historical systems
d. integrated legacy systems
34. When renting a VPN solution, the type of attack you need to consider?
a. Denial of Service (DoS) attacks, Internet Viruses ..
b. Distributed Denial of Service (DDoS) attacks.
c. Data confidentiality, IP Spoofing.
d. Network mapping, Internet Viruses.
35. Active Directory Services perform the following functions
a. Organization and construction of domain; authentication and authorization for the
object
b. Only the activities of security services for Windows Server and authentication,
authorization for objects
c. Only perform the authentication and grant the rights for users and groups
d. Resource management and users; authentication and grant the rights for users and
groups and supervise the activities of the user
36. What is a naming service?
a. is a software that converts a name into a physical address and reverse
b. is a software that converts a IP address into name of host
c. is a software that converts a name into a physical address
d. is a software that determine the resource on the network
37. What port is the FTP used?
a. 21 b. 25 c. 23 d. 80
38. HTTPS port is used ……….
a. 443 b. 80 c. 53 d. 21
39. When installing Windows 2000/2003 Server on NTFS system, but there were no
display tables for the Security in Security?
a. Update Windows 2000 but not before installing remote
b. Installing Windows Server 2000 multiple times on
c. The Windows 2000 is not copyrighted
d. All are correct
40. What is Naming?
a. the name of the object reference
b. the name of the binding activity of the object.
c. names of objects on the network activities
d. all right
B. SHORT ANWSER (TRẢ LỜI NGẮN)
Lecture 1 - Introduction to Integration System
1. Building and maintaining options is an important system engineering heuristic.
Why must system engineers follow this heuristic?
Lecture 2- System Integration Life Cycles
2. Describe 3 disadvantages of the Agile/Scrum software development lifecycle?
6
3. Recommend and briefly justify a System Development Life Cycle (SDLC) (or a
hybrid SDLC) for integrating a small company’s financial and accounting system
with a human resource system that must contain consistent information.
4. The order of the software life cycle phase are
…………………………………………………………………………..
Lecture 3 - Integration Models
5. What does “Coupling” mean with respect to system integration?
6. Describe a design technique for ensuring that systems are reliable.
Lecture 5 – Integration Services
7. What is a naming service?
Lecture 6
8. Why is it important to understand the ACID properties if it is possible to just buy a
COTS product that takes care of this problem?
9. Provide an example of what could go wrong if “Isolation” is not enforced in a
system.
Lecture 7 - Architecture Mismatch
10. What are the common problems when integrating legacy applications?
Lecture 10 – Data Integration
11. What are the advantages and disadvantages of 2nd and 3rd normalization
forms for databases.
12. What are the advantages and disadvantages of creating a separate database
that contains redundant information from all the integrated applications?
Lecture 11 – Security Integration
13. What are some of the security risks in outsourcing software development (you
should be able to come up with at least 3 risks specifically related to outsourcing
software development).
Lecture 13 - Middleware
14. Explain why selecting the middleware is a critical system integration decision.
15. How many structure-oriented Middleware types are there? Please list the names of
those types.
Lecture 14 - Network Integration
16. What is the purpose of network integration?
7
Integration -
Focus
Applicability -
Technology
Standards