System Integration & Architecture
Interactive Quiz | 55 Questions | Lessons 1-6
1
Multiple Choice
What is System Integration?
A. Building standalone applications
B. Connecting different subsystems to function as one unified system
C. Creating separate databases for each department
D. Designing hardware components only
2
Multiple Choice
Which component of an Information System refers to the physical devices?
A. Software
B. Data
C. Hardware
D. Network
3
Multiple Choice
What type of integration connects systems based on specific functional areas or departments?
A. Horizontal Integration
B. Enterprise Application Integration
C. Data Integration
D. Vertical Integration
4
Multiple Choice
Which integration type uses a common communication bus (middleware) to integrate systems?
A. Horizontal Integration
B. Vertical Integration
C. Point-to-Point Integration
D. Silo Integration
5
Multiple Choice
In Point-to-Point Integration, how many connections exist between 4 systems?
A. 4 connections
B. 6 connections
C. 8 connections
D. 10 connections
6
Multiple Choice
What does Logical Architecture focus on?
A. Actual hardware and servers
B. Network cables and data centers
C. System functions, components, and data flow
D. Physical location of equipment
7
Multiple Choice
Which architecture has all processing handled by a single central server?
A. Centralized Architecture
B. Distributed Architecture
C. Hybrid Architecture
D. Microservices Architecture
8
Multiple Choice
What is a major disadvantage of Centralized Architecture?
A. Complex management
B. Single point of failure
C. Network dependency
D. Security challenges
9
Multiple Choice
Which architecture combines centralized and distributed elements?
A. Service-Oriented Architecture
B. Event-Driven Architecture
C. Hybrid Architecture
D. Point-to-Point Architecture
10
Multiple Choice
What principle refers to dividing a system into smaller, independent parts?
A. Scalability
B. Modularity
C. Reliability
D. Interoperability
11
Multiple Choice
Which type of scalability involves adding more servers?
A. Horizontal Scaling
B. Vertical Scaling
C. Diagonal Scaling
D. Linear Scaling
12
Multiple Choice
What does RBAC stand for?
A. Resource-Based Access Control
B. Rule-Based Access Control
C. Role-Based Access Control
D. Request-Based Access Control
13
Multiple Choice
Which authentication method issues a token after login instead of repeatedly asking for credentials?
A. OAuth/SSO
B. JWT (JSON Web Tokens)
C. ABAC
D. RBAC
14
Multiple Choice
What is a data silo?
A. A cloud storage solution
B. A type of database encryption
C. A network security protocol
D. Isolated data within one department not shared across the organization
15
Multiple Choice
Which security measure protects data while it is moving between systems?
A. HTTPS/TLS
B. Database encryption
C. Firewall
D. API Gateway
16
Multiple Choice
What does Physical Architecture show?
A. System functions and data flow
B. Business logic and processing rules
C. Servers, computers, network devices, and data centers
D. User interfaces and screens
17
Multiple Choice
Which is an advantage of Distributed Architecture?
A. Easier maintenance
B. High scalability
C. Simplified backup
D. Central control
18
Multiple Choice
What is the main purpose of an API Gateway?
A. Secure and manage API traffic
B. Replace databases
C. Design user interfaces
D. Create physical networks
19
Multiple Choice
Which access control model uses attributes like time, location, and device?
A. RBAC
B. JWT
C. OAuth
D. ABAC
20
Multiple Choice
What does SSO stand for?
A. Secure System Operation
B. Single Sign-On
C. System Security Override
D. Shared Service Organization
21
Multiple Choice
Which optimization method stores frequently accessed data in memory for faster retrieval?
A. Load balancing
B. Data replication
C. Caching (Redis)
D. Failover
22
Multiple Choice
What is the 4-Layer Defense Model's first layer?
A. Protect the Data (Encryption)
B. Protect the Access (API Security)
C. Protect the Network (Firewalls, VPNs)
D. Watch Everything (Logging & Monitoring)
23
Multiple Choice
Which is a common cause of data leakage between systems?
A. Strong encryption
B. Poor API design
C. Multi-factor authentication
D. Rate limiting
24
Multiple Choice
What does "Authentication" answer?
A. What can you do?
B. Where is the data?
C. How fast is the system?
D. Who are you?
25
Multiple Choice
Which trade-off occurs when increasing security?
A. May reduce performance (e.g., encryption overhead)
B. Automatically improves scalability
C. Has no effect on other factors
D. Increases system speed
26
Identification
Architecture principle that means dividing a system into smaller, independent parts called modules.
27
Identification
The ability of a system to handle growth in users, data, or workload.
28
Identification
The principle that ensures a system consistently works without failure.
29
Identification
Refers to how easy it is to update, fix, or improve a system.
30
Identification
The ability of systems to communicate and work together.
31
Identification
The principle that ensures protection of system data and resources from unauthorized access.
32
Identification
The process of connecting different subsystems, applications, or components so they function together as one unified system.
33
Identification
The conceptual design that defines the structure, components, relationships, and rules governing system interaction.
34
Identification
Occurs when data is isolated within one department or system and is not shared across the organization.
35
Identification
Software that acts as a bridge between systems, handling data transformation and messaging.
36
Identification
The process that verifies the identity of a user or system (answers "Who are you?").
37
Identification
The process that determines what access level a verified user has (answers "What can you do?").
38
Identification
A mechanism that automatically switches to a backup system when the primary system fails.
39
Identification
The process of converting data into a coded form to prevent unauthorized access.
40
Identification
A technique that distributes incoming network traffic across multiple servers to prevent any single server from being overwhelmed.
41
Enumeration (Select all that apply)
Which are the six Core Architecture Principles? (Select three from the list)
A. Modularity
B. Scalability
C. Security
D. Profitability
E. Marketing
42
Enumeration (Select all that apply)
What are the components of an Information System? (Select three)
A. Hardware
B. Software
C. Profit
D. Networks
E. Competitors
43
Enumeration (Select all that apply)
Which are types of System Integration? (Select three)
A. Circular Integration
B. Vertical Integration
C. Horizontal Integration
D. Enterprise Application Integration (EAI)
E. Random Integration
44
Enumeration (Select all that apply)
Which are common integration architectures? (Select three)
A. Point-to-Point Integration
B. Star Integration
C. Service-Oriented Architecture (SOA)
D. Pyramid Architecture
E. Microservices Architecture
45
Enumeration (Select all that apply)
What are the three types of interoperability? (Select three)
A. Financial Interoperability
B. Technical Interoperability
C. Color Interoperability
D. Semantic Interoperability
E. Organizational Interoperability
46
Enumeration (Select all that apply)
Which are major integration challenges? (Select three)
A. Legacy Systems
B. Data Incompatibility
C. Security Risks
D. Too much funding
E. Excessive documentation
47
Enumeration (Select all that apply)
Which are common risks in integrated systems? (Select three)
A. Data interception
B. Too fast performance
C. Unauthorized system access
D. Data leakage between systems
E. Perfect compatibility
48
Enumeration (Select all that apply)
Which are security measures for integrated systems? (Select three)
A. Open APIs without authentication
B. Encryption (HTTPS/TLS)
C. API Gateways
D. Public WiFi for all connections
E. Logging and Monitoring
49
Enumeration (Select all that apply)
Which are strategies for ensuring reliability? (Select three)
A. Redundancy (backup systems)
B. Failover mechanisms
C. Using a single server
D. Data replication
E. Ignoring system alerts
50
Enumeration (Select all that apply)
Which are impacts of data silos? (Select three)
A. Duplicate data
B. Improved decision-making
C. Inconsistent information
D. Faster reporting
E. Poor decision-making
51
Enumeration (Select all that apply)
Which are common authentication methods? (Select three)
A. Username and password
B. Biometrics
C. Multi-Factor Authentication (MFA)
D. Public access without login
E. Guest mode forever
52
Enumeration (Select all that apply)
Which are factors that affect system performance? (Select three)
A. Office furniture quality
B. Network latency
C. Wall paint color
D. Database queries
E. API response time
53
Enumeration (Select all that apply)
Which are layers of the Three-Tier Architecture? (Select three)
A. Presentation Layer
B. Marketing Layer
C. Application Layer
D. Data Layer
E. Decoration Layer
54
Enumeration (Select all that apply)
Which are disadvantages of Point-to-Point Integration? (Select three)
A. Simple for 2-3 systems
B. Hard to scale
C. Difficult maintenance
D. Low initial cost
E. Increased security risks
55
Enumeration (Select all that apply)
Which are governance challenges in system integration? (Select three)
A. Who owns the data?
B. Who approves integrations?
C. What color is the server?
D. Who manages APIs?
E. What is the office temperature?
Submit Quiz
Quiz Results
0/55
Try Again