Deck 4: Enterprise Architectures
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/52
العب
ملء الشاشة (f)
Deck 4: Enterprise Architectures
1
What is a separate and fully equipped facility where the company can move immediately after a disaster and resume business?
A) Cold site
B) Hot site
C) Disaster recovery cost curve chart
D) Disaster recovery plan
A) Cold site
B) Hot site
C) Disaster recovery cost curve chart
D) Disaster recovery plan
B
2
Which of the following is not a component of an information architecture?
A) Backup and recovery
B) Disaster recovery
C) Web services
D) Information security
A) Backup and recovery
B) Disaster recovery
C) Web services
D) Information security
C
3
What determines how applications integrate and relate to each other?
A) Application architecture
B) Information architecture
C) Enterprise architecture
D) Infrastructure architecture
A) Application architecture
B) Information architecture
C) Enterprise architecture
D) Infrastructure architecture
A
4
What addresses when systems can be accessed by employees, customers, and partners?
A) Scalability
B) Capacity planning
C) Reliability
D) Availability
A) Scalability
B) Capacity planning
C) Reliability
D) Availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
5
What is interoperability?
A) Contains a repertoire of web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services
B) The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
C) A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them
D) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
A) Contains a repertoire of web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services
B) The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
C) A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them
D) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
6
What is fault tolerance?
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
7
What are web services?
A) Contains a repertoire of web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services
B) The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
C) A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them
D) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
A) Contains a repertoire of web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services
B) The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
C) A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them
D) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
8
What is failover?
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is not a component of an application architecture?
A) Services
B) Open system
C) Events
D) Capacity planning
A) Services
B) Open system
C) Events
D) Capacity planning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
10
What refers to how well a system can adapt to increased demands?
A) Scalability
B) Capacity planning
C) Reliability
D) Availability
A) Scalability
B) Capacity planning
C) Reliability
D) Availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
11
What is recovery?
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
12
What is recovery?
A) The ability to get a system up and running in the event of a system crash
B) The ability to get a system up and running in the event of a system failure
C) Restoring the information backup
D) All of the above
A) The ability to get a system up and running in the event of a system crash
B) The ability to get a system up and running in the event of a system failure
C) Restoring the information backup
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
13
What is a backup?
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
14
What includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals?
A) Application architecture
B) Information architecture
C) Enterprise architecture
D) Infrastructure architecture
A) Application architecture
B) Information architecture
C) Enterprise architecture
D) Infrastructure architecture
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
15
What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?
A) Cold site
B) Hot site
C) Disaster recovery cost curve chart
D) Disaster recovery plan
A) Cold site
B) Hot site
C) Disaster recovery cost curve chart
D) Disaster recovery plan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is not one of the three components of an enterprise architecture?
A) Application architecture
B) Information architecture
C) Services architecture
D) Infrastructure architecture
A) Application architecture
B) Information architecture
C) Services architecture
D) Infrastructure architecture
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
17
What is an open system?
A) Contains a repertoire of web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services
B) The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
C) A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them
D) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
A) Contains a repertoire of web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services
B) The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
C) A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them
D) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which architecture supports managing user access and using up-to-date antivirus software and patches?
A) Enterprise architect
B) Information architecture
C) Enterprise architecture
D) Infrastructure architecture
A) Enterprise architect
B) Information architecture
C) Enterprise architecture
D) Infrastructure architecture
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
19
What includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets?
A) Enterprise architect
B) Information architecture
C) Enterprise architecture
D) Infrastructure architecture
A) Enterprise architect
B) Information architecture
C) Enterprise architecture
D) Infrastructure architecture
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
20
What determines the future IT infrastructure requirements for new equipment and additional network capacity?
A) Scalability
B) Capacity planning
C) Reliability
D) Availability
A) Scalability
B) Capacity planning
C) Reliability
D) Availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following is not a characteristic of a solid infrastructure architecture?
A) Flexibility
B) Scalability
C) Integrity
D) Performance
A) Flexibility
B) Scalability
C) Integrity
D) Performance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
22
What addresses the timeframes when systems can be accessed by employees, customers, and partners?
A) Reliability
B) Availability
C) Flexibility
D) Performance
A) Reliability
B) Availability
C) Flexibility
D) Performance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
23
What ensures all systems are functioning correctly and providing accurate information?
A) Reliability
B) Availability
C) Flexibility
D) Performance
A) Reliability
B) Availability
C) Flexibility
D) Performance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
24
What type of backup strategy would you recommend to an organization that deals with large volumes of critical information?
A) Hourly
B) Daily
C) Weekly
D) Monthly
A) Hourly
B) Daily
C) Weekly
D) Monthly
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
25
Business continuity planning is a plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
26
Infrastructure architecture identifies where and how important information, like customer records, is maintained and secured.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
27
____________ architecture determines how applications integrate and relate to each other.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
28
What type of backup strategy would you recommend to an organization that deals with small amounts of non-critical information?
A) Hourly
B) Daily
C) Weekly
D) All of the above
A) Hourly
B) Daily
C) Weekly
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
29
What is the primary difference between the different types of backup/recovery media?
A) Speed
B) Cost
C) Expense
D) All of the above
A) Speed
B) Cost
C) Expense
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
30
A(n) ______________ site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
31
The primary characteristics of a solid infrastructure include flexibility, scalability, reliability, availability, and performance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
32
What is a separate facility that does not have any computer equipment, but is a place where employees can move after the disaster.
A) Disaster recovery plan
B) Disaster recovery cost curve
C) Hot site
D) Cold site
A) Disaster recovery plan
B) Disaster recovery cost curve
C) Hot site
D) Cold site
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which of the following is not an primary business goal of enterprise architectures?
A) Reduce costs/improve productivity
B) Improve customer satisfaction
C) Generate goals
D) Create competitive advantages
A) Reduce costs/improve productivity
B) Improve customer satisfaction
C) Generate goals
D) Create competitive advantages
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
34
Fault tolerance is a computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service. Fault tolerance can be provided with software, or embedded in hardware, or provided by some combination
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
35
What does the disaster recovery cost curve chart?
A) The cost to the organization of the unavailability of information
B) The cost to the organization of recovering from a disaster over time
C) The cost to the organization of the unavailability of technology
D) All of the above
A) The cost to the organization of the unavailability of information
B) The cost to the organization of recovering from a disaster over time
C) The cost to the organization of the unavailability of technology
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
36
Performance measures how quickly a system performs a certain process or transaction in terms of efficiency IT metrics of both speed and throughput.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
37
___________ architectures include the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
38
Web services are the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
39
What measures how quickly a system performs a certain process or transaction in terms of efficiency IT metrics of both speed and throughput?
A) Reliability
B) Availability
C) Flexibility
D) Performance
A) Reliability
B) Availability
C) Flexibility
D) Performance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which of the following is a type of backup/recovery media?
A) DVD
B) Tape
C) Disk
D) All of the above
A) DVD
B) Tape
C) Disk
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
41
Explain the three components of an enterprise architecture.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
42
____________ ensures all systems are functioning correctly and providing accurate information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
43
List and describe the three primary steps an organization can take to protect its systems from disasters and catastrophes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
44
List and describe the five characteristics of adaptable systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
45
A(n) ______________ site is a separate facility that does not have any computer equipment, but is a place where employees can move after the disaster.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
46
____________ is a backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
47
_________ ensured all systems are functioning correctly and providing accurate information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
48
Describe how an organization can implement a solid information architecture.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
49
List and describe the five qualities of an infrastructure architecture.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
50
Managing ___________ access to information is a critical piece of the information architecture.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
51
Define backup and recovery and explain the importance of the disaster recovery cost curve to an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
52
Compare web services and open systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck

