Review Questions
1
.
The acronym TRM, refers to what?
-
Technical Reference Model
-
Tactical Reference Model
-
Technical Requirements Model
-
Tactical Requirements Model
2
.
What part of the domain is more directed to technology of the IBM Responsible Computing Framework?
-
responsible impact
-
responsible data usage
-
responsible infrastructure
-
responsible systems
3
.
The OMA applies to the creation and assembly of what?
-
components that assemble services
-
components that can be used for networking backends
-
components that communicate with databases
-
components that can be used for interfaces
4
.
The OMA-RM was created to detail communications and what other service for request brokers?
-
interactions
-
solicitations
-
cloud technologies
-
cyber resources
5
.
The ability to adapt the system to new standards and practices is known as what?
-
tailorability
-
evolvability
-
extensibility
-
scalability
6
.
What ability is also referred to as the learning curve?
-
nomadicity
-
performance
-
adaptability
-
understandability
7
.
The TOGAF model is designed to provide several techniques for what process?
-
quality assessment
-
requirements gathering
-
modeling
-
compliance testing
8
.
The concept of a walled garden approach to web design limits the number of what?
-
colors and shapes
-
controls and plug-ins
-
design layouts
-
third-party software packages
9
.
Cloud-centric technologies face a lot of challenges, but what is the biggest challenge?
-
interoperability
-
usability
-
scalability
-
portability
10
.
Containers provide a quick solution to load different features into what?
-
an instance
-
a wall garden approach to web design
-
a software package
-
an operating system
11
.
What does Kubernetes specialize in?
-
web design
-
network solutions
-
enterprise solutions
-
containers
12
.
What is a big challenge to big data analytics from a TRM perspective?
-
cost
-
resources
-
time
-
vendors
13
.
The largest challenge to IoT as a PaaS is what?
-
scalability
-
adaptability
-
maintainability
-
performance
14
.
Backhauling refers to what?
-
back-up systems for networking
-
load balancing for cloud solutions
-
directing network traffic in a longer, out-of-the-way route
-
reverse engineering a software package
15
.
What are non-technical countermeasures in cybersecurity?
-
network applications, critical infrastructure, and IoT
-
laws, policies, procedures, training, and auditing
-
confidentiality, integrity, and service availability
-
anonymity, authenticity, and assurance
16
.
What cybersecurity domain focuses on protecting the data and digital files maintained in a system?
-
network security
-
application security
-
information security
-
infrastructure security
17
.
As a hacker, you have decided that the best way to achieve your goals is to add a hidden feature or command to a program that will enable you to perform unauthorized actions. What type of malware will you use to achieve this?
-
Trojan horse
-
rootkit
-
worm
-
backdoor
18
.
You are designing a website that will encourage your customers to share opinions, and you want to ensure their civil liberties are protected while keeping their personal data safe from hackers. What aspect of cybersecurity are you concerned about?
-
privacy
-
access control
-
anonymity
-
role-based control
19
.
What process should you use to ensure that Wi-Fi networks are hidden and secured?
-
encryption
-
malware
-
zero knowledge proofs
-
pseudonymity
20
.
In cyber economics, what do we call the network of utilities, roadways, railroads, and buildings necessary to support our transportation, commerce, and other systems?
-
industrial infrastructure
-
responsible data
-
critical infrastructure
-
responsible systems
21
.
What pillar of responsible computing is concerned with using technologies and innovations that make efficient use of available and future technology?
-
responsible impact
-
responsible systems
-
responsible infrastructure
-
responsible code
22
.
In responsible computing, what does it mean to have a responsible system?
-
The system uses little energy and strives for sustainability.
-
The system is inclusive and promotes equality for all.
-
The system emphasizes the use of green energy.
-
The system produces efficient code to have a positive impact on the environment.