Combine 1
Combine 1
Combine 1
height of a switch.
Select one:
True
False
Which network design solution below in the current technology today will extend
access layer connectivity to user devices?
Select one:
a. Redundancy implementation
b. Routing protocol implementation
c. Wireless connectivity implementation
d. Implementing etherChannel
implementation
In this chapter, which two types of spanning tree protocols can cause sub-
optimal traffic flows because they assume only one spanning-tree instance for
the entire bridged network?
Select one:
a. Rapid PVST+ & RSTP
b. STP & MSTP
c. PVST+ & VRRP
d. STP &
RSTP
A network administrator of Genesis Airlines issue a command of show cdp
neigbors on a router, what do you think is the reason?
Select one:
a. To display router ID and other information about OSPF neighbors
c. To display line status and other information about directly connected Cisco
devices
d. To display routing table and other information about directly connected Cisco
devices
Rack Unit is the networking term used to express the thickness or height of a
switch.
Select one:
True
False
Observe the given output below. A certified network engineer is troubleshooting
host connectivity on a LAN that uses a first hop redundancy protocol. Which
IPv4 gateway address should be configured on the host?
a.
Select one:
192.168.2.100
b. 192.168.2.2
c. 192.168.2.1
d. 192.168.2.0
You want to run the new 802.1w on your switches. Which of the following
command syntax would
a. Switch(config)Switch(config)# spanning-tree enable this protocol?
mode 802.1w
Select one:
Among the listed below, what are the distinct functions of layer 2 switching
that increase available bandwidth on the network?
1.Address learning
2.Routing
3.Forwarding and filtering
4.Creating network loops
5.Loop avoidance
6.IP addressing
Select one:
a. 2, 4 and 6
b. 2 and 6
c. 1, 3
and 5
d. 3 and 5
ou want to run the new 802.1w on your switches. Which of the following would
enable this protocol?
a. Switch# spanning-tree mode
Select one:
rapid-pvst
b. Switch# spanning-tree mode 802.1w
c. Switch(config)# spanning-tree mode 802.1w
d. Switch(config)# spanning-tree mode rapid-pvst
Select one:
a. EtherChannel
b. PortFast
c. HSRP
d. trunking
Using 2 switches, which PAgP mode combination will establish an EtherChannel?
Select one:
a. switch 1 set to auto; switch 2 set to on.
b. switch 1 set to auto; switch 2 set to auto.
c. switch 1 set to desirable; switch 2 set to desirable.
d. switch 1 set to on; switch 2 set to desirable.
Which security mode is the least secure choice when a home wireless router is
configured. It is also the first security mode used for wireless?
Select one:
a. WPA
b. WEP
c. TKIP
d. WPA2-Personal
n deploying wireless LAN which parameter is commonly used to identify a
wireless network name when a home wireless AP is being configured?
Select one:
a. AP hostname
b. ESS
c. SSID
d. BESS
Referring to the diagram below. Which switching technology would allow each
access layer switch link to be aggregated to provide more bandwidth between
each Layer 2 switch and the Layer 3 switch?
Select one:
a. EtherChannel
b. trunking
c. PortFast
d. HSRP
In specific 802.11 wireless lan standard what maximum speed can 802.11n
reached?
Select one:
a. 1Gps
b. 600Mbps
c. 54Mbps
d. 128Mbps
Select one:
a. The interface port-channel number has to be different on each switch.
b. The switch ports have to be configured as access ports with each port having
a VLAN
assigned.
c. The switch ports were not configured with speed and duplex mode.
d. The EtherChannel was not configured with the same allowed range of VLANs
on each
interface.
ferring to the lab diagram shown below. The senior network administrator of
ABC merchandize tried to create an EtherChannel between S1 and the other two
switches via the commands that are shown, but was unsuccessful. What is the
problem?
Select one:
a. Traffic cannot be sent to two different switches, but only to two different
devices like an EtherChannel-enabled server and a switch.
b. Traffic can only be sent to two different switches if EtherChannel is
implemented on Layer 3 switches.
c. Traffic can only be sent to two different switches if EtherChannel is
implemented on Gigabit Ethernet interfaces.
d. Traffic cannot be sent to two different switches through the same
EtherChannel link.
s discussed in wireless LAN security, an employee connects wirelessly to the
company network using a cell phone. The employee then configures the cell
phone to act as a wireless access point that will allow new employees to
connect to the company network.
Which type of security threat best describes this situation?
Select one:
a. rogue access point
b. Man in the middle
c. cracking
d. denial of service
c. Replace the wireless NICs on the computers that are experiencing slow
connections.
d. Disable DHCP on the access point and assign static addresses to the wireless
clients.
Which two roles are typically performed by a wireless router that is used in a
home or small business?
Select one:
b. Ethernet switch & access
a. RADIUS authentication server & access point
point
c. Repeater & switch
d. Access point & firewall
What is the maximum data rate specified for IEEE 802.11b WLANs as described
in wireless standards?
Select one:
a. 10 Mbps
b. 11 Mbps
c. 100 Mbps
d. 54 Mbps
In the course of Scaling Networks among the listed below which two protocols
are link aggregation protocols?
Select one:
a. STP & rstp
b. PAgP & 802.3ad
c. EtherChannel & stp
d. 802.3ad & stp
Which statement describes an EtherChannel implementation?
Select one:
a. EtherChannel operates only at Layer 2.
b. PAgP cannot be used in conjunction with EtherChannel.
c. EtherChannel can support up to a maximum of ten separate links.
d. A trunked port can be part of an EtherChannel bundle.
It is known as WiGig and operates using a tri-band solution in the 2.4, 5, and 60
GHz ranges in IEEE wireless standard?
Select one:
a. 802.11ac
b. 802.11g
c. 802.11ad
d. 802.11n
In wireless LAN standards what wireless LAN technology that is an IEEE 802.15
WPAN standard; uses a device pairing process to communicate over distance up
to .05 mile (100m)?
Select one:
a. Wi-Fi
b. None of the choices
c.
Bluetooth
d. WLAN
In wireless LAN technologies what wireless LAN technology that operates in the
range of a few hundred feet?
Select one:
a. Wi-Fi
b. WIMAX
c. Bluetooth
d. WLAN
A network engineer connected 2 switches together with two crossover cables for
redundancy, and STP is disabled. Which of the following will happen between
the switches?
Select one:
a. The routing tables on the switches will not update.
b. The MAC forward/filter table will not update on the switch.
c. The switches will
d. Broadcast storms will occur on the switched automatically load-
network. balance between the two
links.
Among the 802.11 standards what is the frequency assigned for 802.11g?
Select one:
a. 900Mhz
b. 2.4Ghz
c. 3Ghz
d. 5Ghz
When a range of ports is being configured for EtherChannel by the use of PAgP,
which mode will form the bundled channel only if the port receives PAgP packets
from another device?
Select one:
a. active
b. passive
c. desirable
d. auto
Divides the network into functional components while still maintaining the core,
distribution, and access layers of the three-layer model as discussed in chapter
2 LAN Redundancy?
Select one:
a. Cisco Enterprise Architecture
b. Enterprise edge
c. Hierarchical
network
d. Collapsed Core
In managing Cisco devices, what are two ways to access a Cisco switch for out-
of-band management?
Select one:
a. A connection that uses the AUX and and Telnet
b. A connection that uses HTTP and HTTPs
c. A connection that uses the console and AUX port
d. A connection that uses Telnet and SSH
How much traffic for a 24port Gbit switch at hand capable of generating when
operating at full wire speed?
Select one:
As per our discussion in this module LAN Redundancy, what is the outcome of a
Layer 2 broadcast storm?
Select one:
a. ARP broadcast requests are returned to the transmitting host.
b. Routers will take over the forwarding of frames as switches become
congested.
c. New traffic is discarded by the switch because it is unable to be
processed.
d. CSMA/CD will cause each host to continue transmitting frames.
How many switches in a network must be running STP or RSTP in order to avoid
broadcast storms?
Select one:
b. At least one in each
a. All of them.
loop.
c. At least the switch that is chosen as the root bridge.
d. At least one.
Among the choices listed below, which port state will switch ports immediately
transition to when configured for PortFast?
Select one:
a. Blocking
b. Learning
c. Forwarding
d. Listening
If no bridge priority is configured in PVST, which criteria is considered when
electing the root bridge?
Select one:
a. highest IP address
b. highest MAC address
c. lowest IP address
d. lowest MAC
address
A network problem occurs suddenly, what is the initial approach that should be
used to troubleshoot a broadcast storm in a switched network?
Select one:
a. Replace the cables on failed STP links.
b. Manually remove redundant links in the switched network.
c. Insert redundant links to replace the failed STP links.
d. Replace all instances of STP with RSTP.
Access Layer is a design model layer that provides connectivity for the users.
Select one:
True
False
During the implementation of Spanning Tree Protocol, all switches are rebooted
by the network administrator. What is the first step of the spanning-tree election
process?
Select one:
a. Each switch determines the best path to forward traffic.
b. Each switch determines what port to block to prevent a loop from occurring.
c. All the switches send out BPDUs advertising themselves as the root bridge.
d. Each switch with a lower root ID than its neighbor will not send BPDUs.
In FHRP operation, two or more routers are represented as a single ______ router.
Select one:
a. Core
b. Perimeter
c. Virtual
d. Switch
As shown in the exhibit below, which protocol information is being displayed in
the output?
Select one:
a. FHRP
b. HSRP
c. GLBP
d. VRRP
In managing cisco devices, which two requirements must always be met to use
in-band management to configure a network device?
Select one:
a. a direct connection to the console port & at least one network interface that
is connected
and operational
b. a direct connection to the auxiliary port & Telnet, SSH, or HTTP access to the
c. at least one network interface that is connected and operational & Telnet,
SSH, or HTTP
device
access to the device
d. a terminal emulation client & a direct connection to the console port
If you are a network design engineer, which type of router would an enterprise
use to allow customers to access content anytime and anyplace, regardless of
whether they are at home or work?
Select one:
a. Branch routers
b. Modular routers
c. Network edge
routers
d. Service provider routers
Which among the listed below are the 2 functional parts of the network that can
be combined to form a collapsed core design in Cisco Enterprise Architecture?
Select one:
b. Distribution and core
a. Enterprise edge and access layer
layer
c. Access and distribution layer
d. Provider edge and access layer
What are two benefits of extending access layer connectivity to users through a
wireless medium?
Select one:
a. increased bandwidth availability & increased flexibility
b. increased network management options & reduced costs
c. reduced costs & increased flexibility
d. reduced costs & decreased number of critical points of failure
Why would a network administrator of RMS Defence Contractor company issue
the show cdp neigbors command on a router especially if a network problem
occurs?
Select one:
b. To display line status and other information about directly connected Cisco
devices
d. To display routing table and other information about directly connected Cisco
devices
Clear my choice
b. eliminates the need for the spanning-tree protocol & allows automatic
formation of
EtherChannel links
c.allows use of multivendor devices & allows automatic formation of
EtherChannel links
d. provides a simulated environment for testing link aggregation & increases
redundancy to Layer 3 devices
Based on the discussion in this chapter, which command syntax will initiate
EtherChannel interface configuration mode?
Select one:
a. interface interface-identifier
b. channel-group group-identifier
c. interface port-channel interface-
identifier
d. interface range interface-identifier
Among the types of wireless attacks, which one captures wireless traffic that
can be read, stole passwords or leaks sensitive informations?
Select one:
a. Bluetooth Attacks
b.
c. War Driving
d. Jamming
In wireless LAN standards what wireless LAN technology that is an IEEE 802.15
WPAN standard; uses a device pairing process to communicate over distance up
to .05 mile (100m)?
Select one:
b.
a. None of the choices
Bluetooth
c. WLAN
d. Wi-Fi
a. All the interfaces need to work at the same speed & need to be working
in the same
duplex
mode.
Select one:
This wireless attack comes from an old term called war dialing, where people
would dial random phone numbers in search of modems. It is basically people
driving around looking for vulnerable APs to attack. What wireless attack is this?
Select one:
a. Jamming
b. Password theft
c. Bluetooth
d. War
driving
Among the listed below what organization that set or influence WLAN
standards?
Select one:
a. APEC
b. IEEE
c. FBI
d. AWG
Among the listed below what organization that set or influence WLAN
standards?
Select one:
a. AWG
b. APEC
c. FBI
d. IEEE
Which IEEE wireless standard is known as WiGig and operates using a tri-band
solution in the 2, 4, 5, and 60 GHz ranges?
Select one:
a. 802.11ac
b. 802.11n
c.
802.11ad
d. 802.11g
What type of wireless attack that uses the method by flooding an AP with
deauthentication frames?
Select one:
a. War Driving
b. Packet Sniffing
c. Jamming
d. Man in the middle
In wireless LAN technologies what wireless LAN technology that operates in the
range of a few hundred feet?
Select one:
a. Wi-Fi
b. WLAN
c. Bluetooth
d. WIMAX
In AP technology which type of management frame may regularly be
broadcast by an AP?
Select one:
a. beacon
b. probe response
c. authentication
d. probe request
What Cisco switch feature supports higher capacity throughput in switched
networks by combining multiple switch ports in 1 switch?
Select one:
a. Network diameter
b. Redundant links
c. Port upgrade
d. Link aggregation
In specific 802.11 wireless lan standard what frequency band is assigned for
802.11a?
Select one:
a. 2.4Ghz
b. 2.4Mhz
c. 5Ghz
d. 5Mhz
a. hotspot
b. ad hoc
mode
c. infrastructure mode
d. Bluetooth mode
In specific 802.11 wireless lan standard what maximum speed can 802.11ac
reach?
Select one:
a. 11Mbps
b. 54Mbps
c. 600Mbps
d.
1300Mbps
Which type of wireless antenna is best suited for providing coverage in large
open spaces, such as hallways or large conference rooms?
Select one:
a. VHF antenna
b. Yagi
c. Omnidirectional
d. Space satellite
Among the types of wireless attacks, which one basically driving around
looking for vulnerable APs to attack. Sometimes unauthorized person will even
use drones to try and hack APs on higher floors of a building?
Select one:
a. Jamming
b. Packet Sniffing
c. War Driving
d. Man in the Middle
Select one:
a. The switch ports have to be configured as access ports with each port having
a VLAN
assigned.
b. The EtherChannel was not configured with the same allowed range of VLANs
on each
interface.
c. The interface port-channel number has to be different on each switch.
d. The interface port-channel number has to be different on each switch.
The use of PAgP to create EtherChannels is discussed in link aggregation
chapter as part of Scaling Network. Which statement below as discussed in this
course is true about PagP?
Select one:
a. It is a Cisco Proprietary
b. It mandates that an even number of ports (2, 4, 6, etc.) be used
c. It increases the number of ports that are participating in spanning tree.
d. It requires more physical links than LACP does.
9/7/2020 Pre-Final Exam: Attempt review
https://semestral.amaesonline.com/mod/quiz/review.php?attempt=57426&cmid=18277&showall=1 1/14
9/7/2020 Pre-Final Exam: Attempt review
3
Question
Refer to the network topology diagram above. A certified network expert has configured
the OSPF timers to the values that are shown in the graphic. What is the result of
having those manually configured timers?
Select one:
a. The neighbor adjacency has formed.
The correct answer is: The R1 dead timer expires between hello packets from R2.
In link state advertisement the type 1 LSAs are also refered to as:
Question4
Correct
Select one:
Mark 1.00 out of a. Summary link entries
1.00
b. IP link entries
c. Single-area OSPF
d. Multi-area OSPF
An ASBR generates type 5 LSAs for each of its external routes and floods them into the
area that it is connected to.
https://semestral.amaesonline.com/mod/quiz/review.php?attempt=57426&cmid=18277&showall=1 2/14
9/7/2020 Pre-Final Exam: Attempt review
7
Question Select one:
Correct True
Mark 1.00 out of False
1.00
Question8
Correct
Refer to the exhibit shown. What command statement must be issued to complete the
configuration at R1 for multiarea OSPF.
Select one:
a. network 192.168.10.128 0.0.0.127 area 0
In OSPF configuration understanding which parameter would you tune to affect the
selection of a static route as a backup, when a dynamic protocol is also being used?
Select one:
a. administrative distance
Question9
b. link bandwidth
Correct
Select one:
a. Ip addresses of the 2 serials are the same or conflict
b. The OSPFv2 process IDs on each router do not match.
c. The subnet masks on the two connected serial interfaces do not match.
d. A clock rate has not been set on the DCE interface of the serial link.
The correct answer is: The subnet masks on the two connected serial interfaces do not
match.
https://semestral.amaesonline.com/mod/quiz/review.php?attempt=57426&cmid=18277&showall=1 3/14
9/7/2020 Pre-Final Exam: Attempt review
10
Question In RMS University, the network admin is trying to add a new router into an established
OSPF network.
The network attached to the new router do not appear in the routing tables of the other
OSPF routers. Given the information in the partial configuration shown below, what
configuration error is causing this problem?
Router(config)# router ospf 1
Router(config-router)# network 10.0.0.0 255.0.0.0 area 0
Select one:
a. The OSPF area is configured improperly.
b. The process id is configured improperly.
c. The network number is configured improperly.
The correct answer is: The network wildcard mask is configured improperly.
Question11
Correct
OSPF type 2 LSA messages are only generated by the DR router to advertise routes in
Mark 1.00 out of multiaccess networks.
1.00
Select one:
True
False
The backbone area interconnects with all other OSPF area types.
Select one:
True
False
Question12
Select one:
a. Ip route 10.0.0.0 0.0.0.255 Serial0
Observe the exhibit shown above. These two routers are configured to run OSPFv3 but
they are not forming a neighbor adjacency. What is the cause of the problem?
Select one:
a. The routers have both been elected as the DR.
b. The routers do not have global IPv6 addresses that are configured on the Fa0/0
interfaces.
https://semestral.amaesonline.com/mod/quiz/review.php?attempt=57426&cmid=18277&showall=1 4/14
9/7/2020 Pre-Final Exam: Attempt review
14
Question c. The routers are configured with the same router ID.
Incorrect d. The routers have the same priority.
Mark 0.00 out of
1.00
The correct answer is: The routers are configured with the same router ID.
Which two pieces of information are used by the OSPF MD5 algorithm to generate a
signature?
Select one:
a. Secret key & OSPF message
b. OSPF router ID & loopback interface
Question15
c. Router hostname & mac-address
Correct
d. Interface ip address & secret key
Mark 1.00 out of
1.00
What happens when a router has two network statements in different areas?
Select one:
a. It becomes BDR
b. It becomes ASBR
c. It becomes ABR
Question16 d. It becomes DR
Correct
In OSPF networks discussion what router that has at least one interface that is attached
to a non-OSPF network?
Select one:
a. ASBR
b. ABR
c. Backbone Router
Question17
d. Internal Router
Incorrect
Refer to the show command test result shown above. What is indicated by the O IA in
the router output?
Select one:
a. The route was learned from within the area.
b. The route was learned from outside the internetwork.
https://semestral.amaesonline.com/mod/quiz/review.php?attempt=57426&cmid=18277&showall=1 5/14
9/7/2020 Pre-Final Exam: Attempt review
18
Question c. The route was manually configured.
d. The route was learned from another area.
The correct answer is: The route was learned from another area.
Select one:
a. OSPF uses the bandwidth value to compute routes for its routing table.
b. Each side of an OSPF serial link should be configured with a unique value.
c. Bandwidth value affects the actual speed of the link.
Question19
d. All serial interfaces default to a value of 1.544 Mb/s.
Incorrect
In troubleshooting OSPF issues why do OSPF serial interfaces usually require manual
bandwidth configuration?
Select one:
a. OSPF uses the bandwidth value to compute the router IDs
b. OSPF uses the bandwidth value to compute routes for its routing table.
c. All serial interfaces default to a value of 1.544 Mb/s.
d. Each side of an OSPF serial link should be configured with a unique value.
Question20
Correct
Question21
Correct
https://semestral.amaesonline.com/mod/quiz/review.php?attempt=57426&cmid=18277&showall=1 6/14
9/5/2020 Prelims
The correct answer is: OSPF uses the bandwidth value to compute routes for its routing table.If all OSPF
routers in a single area are configured with the same priority value, what value does a router use for the OSPF
router ID in the absence of a loopback interface?
22
Select one:
a. the highest IP address among its active interfaces
b. the lowest IP address among its active interfaces
c. the IP address of the first Fast Ethernet interface
d. the IP address of the console management interface
The correct answer is: the highest IP address among its active interfaces
A network administrator is implementing OSPF in a portion of the network and must ensure that only
specific routes are advertised via OSPF. Which network statement would configure the OSPF process for
networks 192.168.4.0, 192.168.5.0, 192.168.6.0, and 192.168.7.0, now located in the backbone area, and
inject Question23 them into the OSPF domain?
Correct
Select one:
Mark 1.00 out of
a. 1.00 c
b. w
c. w
d. w
The ABC Mining company network administrator has been asked to summarize the routes for a new OSPF
area. The networks to be summarized are 172.16.8.0, 172.16.10.0, and 172.16.12.0 with subnet masks of
255.255.255.0 for each network. Which command should the administrator use to forward the
summary route for area 15 into area 0?
Question24
Select Incorrect
one:
a. Mark 0.00 out of network 172.16.8.0 0.0.0.7 area 15
b. 1.00 network 172.16.8.0 0.0.7.255 area 0
c. network 172.16.8.0 0.0.7.255 area 15
d. network 172.16.8.0 0.0.0.7 area 0
Select one:
a. any router
Question25
b. ASBR
Incorrect
c. Mark 0.00 out of
ABR
d. 1.00 DR
Which show command is used to display the collection of OSPF link states?
Select one:
a. show ip ospf lsa database
b. show ip ospf link-state
https://semestral.amaesonline.com/mod/quiz/attempt.php?attempt=54581&cmid=18265 7/7
9/29/2020
c. show ip ospf database
d. show ip ospf neighbors
26
The correct answer is: show ip ospf database
Select one:
a. O E2
b. C
c. O IA
Question27
d. O
Correct
Select one:
a. Inter-area route
b. External route
c. Intra-area route
d. Static route
Select one:
a. show ipv6 ospf interface serial 0/0/0
The Question29 correct answer is: show ip ospf interface serial 0/0/0
Correct
Select one:
Prelim Exam: Attempt review
https://semestral.amaesonline.com/mod/quiz/review.php?attempt=60698&cmid=17929
2/2
9/29/2020 Prelim Quiz 2: Attempt review
Question3
Feeling confident about their organization's security level
: When information security community
Complete members participated in the Cybersecurity Trends Report, they were asked how positive they felt about
Mark 1.00 out of their security stance.
1.00
Select one:
True
False
Select one:
a. Security, Medical, Political, Environmental and Infrastructural Risks
b. Security, Government, Political, Environmental and Infrastructural Risks
https://semestral.amaesonline.com/mod/quiz/review.php?attempt=38868&cmid=17928 1/3
9/29/2020 Prelim Quiz 2: Attempt review
Question6
Complete
Mark 5.00 out of Fifth Reason why investing in information security is significant Answer:
5.00
Regulatory compliances
Answer:
Computer and Information Systems Managers
Question8
Answer:
Software Developer
Question10
Complete
Question11
Answer:
Complete
Proliferation of IoT devices
Mark 1.00 out of
1.00
Question12
Complete
https://semestral.amaesonline.com/mod/quiz/review.php?attempt=38868&cmid=17928 2/3
9/29/2020 Prelim Quiz 2: Attempt review
https://semestral.amaesonline.com/mod/quiz/review.php?attempt=38868&cmid=17928 3/3
9/29/2020
Pr
9/29/2020
9/29/2020
9/29/2020
https://semestral.amaesonline.com/mod/quiz/review.php?attempt=60698&cmid=17929 2/2
Started on Tuesday, 29 September 2020, 8:08 PM
State Finished
Completed on Tuesday, 29 September 2020, 9:02 PM
Time taken 54 mins 7 secs
Grade 46.00 out of 50.00 (92%)
Question 1
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Is to model the procedural flow of actions that are part of a larger activity
Select one:
a. Activity Diagram
b. Scenario Diagram
c. Constraints
d. Sequence Diagram
Feedback
Question 2
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Feedback
Question 3
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Feedback
Question 4
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Question 5
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Conditions that must be true once the use case is run e.g. <order is
modified and consistent>; Select one:
a. System
b. Style
c. Post
d. Constraints
Feedback
Question 6
Complete
Mark 0.00 out of 1.00
Flag question
Question text
Select one:
a. Evaluation Phase
b. Contraints
c. Requirements
d. Use Case Model
Feedback
Question 7
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Feedback
Flag question
Question text
These are the formal rules an limitations that a use case operates under, and
includes prepost and invariant conditions.
Select one:
a. Post
b. Activity Diagram
c. Sequence Diagram
d. Contraints
Feedback
Question 9
Complete
Mark 1.00 out of 1.00
Flag question
Question text
The static constructs are used, together with descriptions of the dynamic
behavior of the architecture to obtain the executable operational X-architecture
(X = executable property) Select one:
a. Analysis Phase
b. Synthesis Phase
c. Evaluation Phase
Feedback
Question 10
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Feedback
Question 11
Complete
Mark 1.00 out of 1.00
Flag question
Question text
c. Architecture
d. Connectors
Feedback
Question 12
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Feedback
Question 13
Complete
Mark 1.00 out of 1.00
Flag question
Question text
a. Connectors
b. Architecture
c. Systems
d. Properties
Feedback
Question 14
Complete
Mark 1.00 out of 1.00
Flag question
Question text
a. Connectors
b. Components
c. Properties
d. System
Feedback
Question 15
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Is a method for understanding an element as far as its motivation, as three
stages
Select one:
a. System Architecture
b. System Thinking
c. System
d. System Integration
Feedback
Question 16
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Feedback
Question 17
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. Stakeholders
b. Web Designer
c. Analysis
d. Programmer
Feedback
Question 18
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Feedback
Question 19
Complete
Mark 1.00 out of 1.00
Flag question
Question text
a. System
b. Evaluation Phase
c. Analysis Phase
d. Synthesis Phase
Feedback
Question 20
Complete
Mark 1.00 out of 1.00
Flag question
Question
text
se: Processes exist that need to take place in order that the system
Is it true or accomplish
fal
its unctions
intended f
Select one:
True
False
Question 21
Complete
Mark 1.00 out
of
1.00
Flag question
Question text
True
False
Question 22
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Is it true or false that clarify the conduct or properties of the thing to be clarified
as far as its role(s)or function(s) inside its containing entirety
Select one:
True
False
Question 23
Complete
Mark 3.00 out of 3.00
Flag question
Question text
Feedback
Question 24
Complete
Mark 0.00 out of 1.00
Flag question
Question text
Team members are given more autonomy and expected to take more
responsibility for their work.
Select one:
a. Functional Structure
b. Project Organization Structure
c. Matrix Structure
d. Divisional Structure
Feedback
Question 25
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
True
False
Question 26
Complete
Flag question
Question
text
C
Acronym: are Development Life Cycle
SDL
Softw
Answer
:
Question 27 1.00
Complete
Mark 1.00 out
of
Flag question
Question
text
se: The individual processes transform either data or materials that
Is it true or“flow”
fal
between
them
Select one:
True
False
Question 28
Complete
Mark 1.00 out
of
1.00
Flag question
Question text
The advantages of this kind of structure include quick decision making because
the group members are able to communicate easily with each other.
Select one:
a. Functional Structure
b. Divisional Structure
c. Project Organization Structure
d. Matrix Structure
Feedback
Question 29
Complete
Mark 1.00 out of 1.00
Flag question
Question text
a. Functional Stucture
b. Divisional Structure
c. Matrix Structure
d. Project Organization Structure
Feedback
Question 30
Complete
Mark 0.00 out of 1.00
Flag question
Question text
This kind of structure will ensure greater output of varieties of similar products.
Select one:
a. Matrix Structure
b. Project Organization Structure
c. Functional Structure
d. Divisional Structure
Feedback
Question 31
Complete
Mark 1.00 out of 1.00
Flag question
Question
text
s of Object-Oriented approach: Requires some early elimination of
Disadvanta technology
ge
alternatives the absence of reliable information
in
Select
one:
True
False
Question 32
Complete
Mark 1.00 out
of
1.00
Flag question
Question text
The teams are put together based on the number of members needed to
produce the product or complete the project.
Select one:
a. Divisional Structure
b. Matrix Structure
c. Functional Structure
d. Project Organization Structure
Feedback
Question 33
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Feedback
Question 34
Complete
Mark 1.00 out of 1.00
Flag question
Question text
b. Matrix Structure
c. Project Organization Structure
d. Functional Structure
Feedback
Question 35
Complete
Mark 1.00 out of 1.00
Flag question
Question
text
se that clarify the conduct or properties of the containing entirety.
Is it true or
fal
Select
one:
True
False
Question 36 1.00
Complete
Mark 1.00 out
of
Flag question
Question text
Developers program in pairs and must write the tests for their own code.
Select one:
a. Scrum
b. SDLC
c. Extreme Programming
d. SLDC
Feedback
Question 37
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Are more complex in that they group people in two different ways: by the
function they perform and by the product team they are working with.
Select one:
a. Divisional Structure
b. Matrix Structure
c. Functional Structure
d. Project Organization Structure
Feedback
Question 38
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Feedback
Question 39
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Feedback
Question 40
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Question 41
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Architecture
The wordAnsweris derived from the Greek word
“architecton”, which means master mason or master builder
Question 42
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Feedback
Your answer is correct.
Question 43
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Things that the use case must allow the user to do, such as
Select one:
a. Requirements
b. Style
c. Activity Diagram
d. System
Feedback
Question 44
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Feedback
Your answer is correct.
Question 45
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Feedback
Question 46
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. SDLC
b. SLDC
c. Scrum
d. Extreme Programming
Feedback
Question 47
Complete
Mark 1.00 out of 1.00
Flag question
Question text
The teams are put together based on the number of members needed to
produce the product or complete the project.
Select one:
a. Functional Structure
b. Divisional Structure
c. Project Organization Structure
d. Matrix Structure
Feedback
Question 48
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Feedback