0% found this document useful (0 votes)
88 views12 pages

Ontaptichophethong

pỏiewsd

Uploaded by

nohope4n
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views12 pages

Ontaptichophethong

pỏiewsd

Uploaded by

nohope4n
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

ÔN TẬP

Course: SYSTEM INTEGRATION PRACTICES – SE445


Semester: 1 Academic year: 2021-2022

A. TEST (TRẮC NGHIỆM)


1. The following algorithm is a symmetric encryption algorithm…………………
a. Triple –DES, RC4, RC5, Blowfish
b. Triple –DES, RC4, RC5, IDEA
c. RC4, RC5, IDEA, Blowfish
d. IDEA, Blowfish, AES, Elliptic Cure

2. Who will benefit from the integration system?


a. Customer
b. Organizers of the enterprise
c. The people participate in the system
d. Everybody

3. What contents are the Information System included?


a. Historical data analysis, Process consistency, Exception reporting, security of data,
Transparency to users
b. Data consistency, Data accessibility, Exception reporting, Historical data analysis,
Process consistency
c. Data consistency, Data accessibility, Exception reporting, security of data,
Transparency to users
d. Historical data analysis, Process consistency, Historical data analysis, Calculations on
data

4. Briefly describe 5 advantages for integrating legacy systems


a. Business Process Automation/Streamlining, Cost Savings, e-Commerce Support,
Information Management, Common Security Infrastructure
b. Business Process Automation/Streamlining, Cost Savings, e-Commerce Support,
increasing data quality, may be cheaper to integrate existing legacy systems than build or
acquire completely new system
c. may be cheaper to integrate existing legacy systems than build or acquire
completely new system, can be integrated across organizational boundaries in order
to provide e-commerce capability, can be achieved by elimination of manual
information processing, Integration of systems can aid in encouraging data
standardization, increasing data quality, and increasing data accessibility
throughout the enterprise. Integration of legacy systems into common enterprise
security infrastructure

1
d. Information Management, Common Security Infrastructure, may be cheaper to
integrate existing legacy systems than build or acquire completely new system, can be
integrated across organizational boundaries in order to provide e-commerce capability,
Integration of legacy systems into common enterprise security infrastructure

5. Describe the disadvantages of the Agile software development lifecycle


a. The user may not have time to work with the developers, not suitable for systems that
require a high degree of verification and validation
b. Not suitable for systems that require a high degree of verification and validation, Non-
functional or system properties are difficult to plan
c. The user may not have time to work with the developers, Non-functional or system
properties are difficult to plan
d. Not suitable for systems that require a high degree of verification and validation,
Non-functional or system properties are difficult to plan, the user may not have time
to work with the developers

6. The technologies support for integration System are


a. RPC, Middleware, Web, DTML, HTML
b. Middleware, Web, XML, Distributed Objects
c. ODBC, LDAP, XML, Distributed Objects
d. OLE, COM+, Web, XML, Distributed Objects

7. The most important the values of Integration Heuristics


a. Do not care about the most complete
b. Build and maintain options as long as possible in the design and implementation
of complex systems
c. Choose the elements so that independent as possible
d. Simplify the components in the system if possible

8. IPSec security protocols operate at layer


a. Only in the transport layer in the OSI model
b. from 4 layer to 7 layer in OSI model
c. Network Layer in OSI model
d. All right

9. What’s the Software Development Life Cycle – SDLC?


a. Is a process to improve software products
b. Is active in a specific project plan
c. Is the time from when the software starts to form until it is no longer used anymore
d. All are correct

10. What are the main difference of the life cycles?


a. Number of stages implemented
2
b. Execution time of each s`tages
c. Emphasis, duration, and timing of each stages
d. All are correct

11. Building and maintaining options is an important system engineering heuristic.


Why must system engineers follow this heuristic?
a. often complex with many unanticipated problems that can arise
b. flexibility to deal with these problems
c. a and b are correct
d. a and b are wrong

12.Integrated Security includes


a. Firewalls, Authentication, Integrity, Non repudiation, Confidentiality
b. Firewalls, Authentication, Integrity, Authorization, Confidentiality
c. Firewalls, Authentication, Integrity, Authorization, Confidentiality
d. Firewalls, Non repudiation, Integrity, Authorization, Confidentiality,
Authentication

13. Why are you integrating?


a. Adaptable systems and processes, Integrated security, Management information,
Reliable and recoverable systems, Economies of scale
b. Streamlined business processes, Replaceable components, Adaptable systems and
processes, Integrated security, Economies of scale
c. Management information, Reliable and recoverable systems, Streamlined business
processes, Replaceable components, Economies of scale
d. Adaptable systems and processes, Streamlined business processes, Management
information, Support for electronic commerce, Integrated security, Replaceable
components, Economies of scale

14. How do you select a system development life cycle for a system integration
project ?
a. Suitability for small development team, Customizability / Flexibility of approach,
Market adoption
b. Compatibility with distributed teams, Ability to handle rapidly changing (unstable) set
of requirements, Emphasis on quality measurement
c. Size of product, Implementation cost, Built-in support for prototyping
d. All are correct

15. What Integration System is the easiest to perform all models?


a. Data Integration
b. Presentation Integration
c. Functional Integration
d. a,b,c false

3
16. The order of the software life cycle phase
a. Preliminary Investigation, Analysis, Design, Development/Construction, Testing,
Implementation, Maintenance
b. Preliminary Investigation, Analysis, Design, Testing, Implementation, Maintenance,
Development/Construction
c. Design, Development/Construction, Testing, Implementation, Maintenance,
Development/Construction, Preliminary Investigation
d. Preliminary Investigation, Analysis, Design, Implementation, Maintenance,

17. The integrated models include


a. Presentation Integration, Security Integration, Functional Integration
b. Data Integration, Network Integration, Functional Integration
c. Functional Integration, Environment Integration, Presentation Integration
d. Presentation Integration, Data Integration, Functional Integration

18. System integration life cycle differs from Software Development Life Cycle are
a. Legacy system analysis, Testing and Dependencies
b. Legacy system analysis, Accessibility of legacy information constrains the design,
Testing, and Dependencies
c. integration, adaptation, and Accessibility of legacy information constrains the design,
d. stages of operation, flexibility and resilience,

19. Changes in underlying databases may affect GUI, Data may be inconsistent, and
API’s may not fully support information requirements, these are the disadvantages
of the integrated model
a. Data Integration
b. Presentation Integration
c. Functional Integration
d. all right

20.The protocol for securing e-mail is


a. GPG, S/MINE
b. SHA-1, S/MINE
c. CAST-128 / IDEA/3DES
d. Kerberos, X.509

21. What are two architectures for Data Integration?


a. data exchange is used with controlled data duplication, instead of on-line update.
b. Using a data conversion system on a unified format before using or in
combination with database synchronization from the component database
c. Convert component databases into messages or use the database to extract data
elements
d. No specific architecture for data integration
4
22. Maintenance can be difficult and data may be inconsistent, these are the
characteristics of the integrated model
a. Data Integration and Functional Integration
b. Presentation Integration and Functional Integration
c. Data Integration and Presentation Integration
d. all right

23. Security services includes:


a. Authentication, Login, Data Confidentiality
b. Authentication, Data Integrity, Data Confidentiality
c. Authentication, Non repudiation, Access control
d. Authentication, grant, Access control

24. When is it Appropriate to use the Presentation Integration Model


a. Presentation models are Executive dashboards or Operational status displays
b. Information presentation is through application API’s, Cannot access databases
directly
c. Integrate with an application whose only useful and implementable integration
base interface or dashboards, cannot access databases directly.
d. Databases are independent – No coupling, Cannot access databases directly

25. The systems following are RPC


a. Sun RPC, DCE RPC, CORBA
b. Microsoft DCOM, Microsoft.NET Remoting
c. Java RMI, XML RPC, SOAP
d. All right

26. The purpose of the network integration is


a. These services must be configured to trust each other
b. Easy data exchange between services and each other
c. Increase the linkages between the components in the network
d. All right

27. Please provide the name of the main styles integration systems
a. File Transfer, Shared Database, Remote Procedure Invocation, Integration Guidelines
b. File Transfer, Shared Database, Remote Procedure Invocation, Messaging
c. File integration, Shared Database, Remote Procedure Invocation, Messaging
d. Integration Guidelines, File integration, Shared Database, Remote Procedure
Invocation

28. Data Integration Common Mistakes


a. Take more storage spaces for data integration
b. High cost

5
c. Difficult to apply in practice
d. Testing without a sufficient set of real data, Waiting for the data analyst to finish
developing the perfect schema

29. .................................................are the fundamentals of system security


a. Authentication, access control, Login
b. Authentication, access control and Data Confidentiality
c. Authentication, access control, and auditing
d. Authentication, access control and Non repudiation

30. How many types middles do you have?


a. Asynchronous communication, Subscribe Messaging, CORBA, ACID
b. Message Oriented Middleware, Object Architectures, Transaction Processing
c. Object Architectures, Transaction Processing. Subscribe Messaging
d. Message Oriented Middleware, Object Architectures, Transaction Process Monitors

31. You need to ensure use symmetric encryption is


a. Have good encryption algorithm, there is a secret key known by the recipient /
posts and channels to distribute the secret key
b. Have a suitable channel and a secret key known by the recipient / posts
c. Have good encryption algorithm and a secret key known by the recipient / posts
d. All right

32. SSL security constraints operating on the layer


a. Network, Transport
b. Network, Session
c. Application, Session
d. a, b and c ware wrong

33. When were Architectural mismatches found ?


a. integrated Story Systems
b. integrated analytical systems
c. integrated historical systems
d. integrated legacy systems

34. When renting a VPN solution, the type of attack you need to consider?
a. Denial of Service (DoS) attacks, Internet Viruses ..
b. Distributed Denial of Service (DDoS) attacks.
c. Data confidentiality, IP Spoofing.
d. Network mapping, Internet Viruses.

35. Active Directory Services perform the following functions


a. Organization and construction of domain; authentication and authorization for

6
the object
b. Only the activities of security services for Windows Server and authentication,
authorization for objects
c. Only perform the authentication and grant the rights for users and groups
d. Resource management and users; authentication and grant the rights for users and
groups and supervise the activities of the user

36. What is a naming service?


a. is a software that converts a name into a physical address and reverse
b. is a software that converts a IP address into name of host
c. is a software that converts a name into a physical address
d. is a software that determine the resource on the network

37. What port is the FTP used?


a. 21 b. 25 c. 23 d. 80

38. HTTPS port is used ……….


a. 443 b. 80( dùng cho HTTP ) c. 53 d. 21

39. When installing Windows 2000/2003 Server on NTFS system, but there were no
display tables for the Security in Security?
a. Update Windows 2000 but not before installing remote
b. Installing Windows Server 2000 multiple times on
c. The Windows 2000 is not copyrighted
d. All are correct

40. What is Naming?


a. the name of the object reference
b. the name of the binding activity of the object.
c. names of objects on the network activities
d. all right

7
B. SHORT ANWSER (TRẢ LỜI NGẮN)
Lecture 1 - Introduction to Integration System
1. Building and maintaining options is an important system engineering heuristic.
Why must system engineers follow this heuristic?
System engineers build and maintain options to stay flexible and handle changes.
This helps manage risks, encourages new ideas, keeps stakeholders happy, and
saves costs over time. It also makes systems more reliable and ready for future
needs.
Lecture 2- System Integration Life Cycles
2. Describe 3 disadvantages of the Agile/Scrum software development lifecycle.
- Requirements and vision may not be well-developed
- Difficult to integrate security
- Often no documentation
- Very short increments develop

3. Recommend and briefly justify a System Development Life Cycle (SDLC) (or a
hybrid SDLC) for integrating a small company’s financial and accounting system
with a human resource system that must contain consistent information.

- I recommend using the Agile SDLC for integrating the financial and HR systems.

1. Flexibility: Agile adapts easily to changes.


2. Feedback: Regular feedback ensures systems meet needs.
3. Progress: Work in small, manageable steps.
4. Collaboration: Promotes teamwork for smooth integration.

Agile makes the process adaptable, collaborative, and efficient.

4. The order of the software life cycle phase is…………………………


- Conception
- Requirements Analysis
- Specification
- Design
- Implementation
- Testing
- Training and Support
- Maintenance
- Retirement

Lecture 3 - Integration Models


8
5. What does “Coupling” mean with respect to system integration?
In system integration, coupling refers to how dependent system components are
on each other.

 Tight Coupling: High dependency, changes affect others.


 Loose Coupling: Low dependency, easier maintenance and flexibility.

6. Describe a design technique for ensuring that systems are reliable.


- A design technique for ensuring system reliability is redundancy, which involves adding
duplicate components or systems to provide backups in case of failure.

Lecture 5 – Integration Services


7. What is a naming service?
- All entities have a friendly unique name and can be found. Software that converts a
name into a physical address

Lecture 6
8. Why is it important to understand the ACID properties if it is possible to just buy a
COTS product that takes care of this problem?
- it ensures you can accurately assess the product's suitability for specific business needs,
particularly in terms of data integrity and transaction reliability.

9. Provide an example of what could go wrong if “Isolation” is not enforced in a system.


- concurrent transactions can interfere with each other.
Lecture 7 - Architecture Mismatch
10. What are the common problems when integrating legacy applications?
- compatibility issues with newer technologies, limited support for modern
communication protocols, difficulty accessing or modifying existing data, and increased
maintenance costs due to complex dependencies .

Lecture 10 – Data Integration


11. What are the advantages and disadvantages of 2nd and 3rd normalization
forms for databases?

Advantages and Disadvantages of 2nd Normal Form (2NF):

Advantages:

 Less Redundancy:

9
 Better Data Quality:

Disadvantages:

 Complexity:.
 Performance: .

Advantages and Disadvantages of 3rd Normal Form (3NF):

Advantages:

 Even Less Redundancy:


 Simpler Queries: .

Disadvantages:

 More Joins: Getting data could need joining more tables.


 Needs Good Data Management: Requires careful handling of data relationships.

12. What are the advantages and disadvantages of creating a separate database that
contains redundant information from all the integrated applications?
-
Lecture 11 – Security Integration
13. What are some of the security risks in outsourcing software development (you
should be able to come up with at least 3 risks specifically related to outsourcing
software development).
- Data Breaches:
- Lack of Control:
- Compliance Issues

Lecture 13 - Middleware
14. Explain why selecting the middleware is a critical system integration decision.
- it facilitates communication, data exchange, and interoperability between different
systems and applications, ensuring seamless integration and efficient operations.

15. How many structure-oriented Middleware types are there? Please list the names of
those types.
- Message - Oriented Middleware
- Object - Oriented Middleware

10
- Transaction Middleware

Lecture 14 - Network Integration


16. What is the purpose of network integration?
- enables seamless communication and data exchange between different systems and
services within the network, enhancing connectivity and interoperability.

C. ESSAY (TỰ LUẬN)


17. 9Integration Focus, Applicability, Technology and Standards.
Criteria Presentation Dat Functional
a
Integration Combining user Consolidating data Integrating business
Focus
interfaces from from multiple processes and
multiple systems sources functions

Applicability Suitable for Ideal for reporting, Useful for reusing


providing a unified analytics, and data business logic and
user experience consistency services

Technology Web portals, Single ETL (Extract, APIs, Web services,


sign-on (SSO), UI Transform, Load), Microservices, SOA
mashups Data warehouses, (Service-Oriented
Database Architecture)

Standards HTML, CSS, replication


SQL, REST, SOAP,
JavaScript, SAML ODBC/JDBC, WSDL (Web
(Security Assertion XML, JSON Services Description
Markup Language) Language), BPEL
(Business Process
Execution
Language)

18. Presenting solutions when integrating 2 applications that do not match on Platforms.

11
When integrating two applications on different platforms, you can:

1. Use middleware or APIs to translate communication.


2. Convert data formats using transformation tools.
3. Develop wrapper services to adapt interfaces.
4. Consider hybrid approaches for seamless integration.

19. How do data redundancy problems occur when integrating 2 applications?


When integrating two applications, data redundancy happens when the same
information is stored in both systems, leading to duplication and inconsistency.

20. Outline the enterprise integration model. Explain the operation of the components in
this model.

 Integration Middleware: Moves messages between systems, changes data formats, and
ensures messages get where they need to go.

 Data Transformation Tools: Change data formats so systems can understand each
other's information.

 Service-Oriented Architecture (SOA): Creates reusable units of functionality that


systems can share and use.

 Enterprise Application Integration (EAI) Tools: Use pre-built connections to join


specific applications, making integration easier and faster.

 Business Process Management (BPM) Systems: Automate and manage workflows


across systems, making processes more efficient.

12

You might also like