ThatQuiz Test Library Take this test now
Sysinsy
Contributed by: Roan
  • 1. is the process of connecting different computing systems, applications, and software so that they can work together as a coordinated whole.
A) e-commerce platform
B) Data Integration
C) System Integration
  • 2. A company’s Sales System, Inventory System, and Accounting System share data automatically so that when a product is sold, inventory updates and accounting records are adjusted instantly. is an example of
A) Enterprise Integration
B) System Integration
C) Application Integration
  • 3. What is one common problem organizations face without integration?
A) Data duplication
B) Manual updates
C) Slow processes
  • 4. Which of the following is a benefit of integration?
A) Increased errors
B) More manual work
C) Automated tasks
  • 5. How does integration improve accuracy?
A) By adding more systems
B) Through real-time, consistent data
C) By increasing manual input
  • 6. What happens to processes in an organization that lacks integration?
A) They slow down
B) They fully automate
C) They operate in real time
  • 7. Which benefit of integration helps departments work together smoothly?
A) Manual data entry
B) Collaboration
C) System isolation
  • 8. What is a common issue when data is stored in separate systems?
A) Unified data
B) Automated processes
C) Data duplication
  • 9. It is the process of connecting different computing systems so they can work together as one coordinated whole.
A) System Automation
B) Digital Processing
C) System Integration
  • 10. This integration technology uses HTTP, is lightweight, and is widely used in modern applications.
A) WSDL
B) REST
C) XML-RPC
  • 11. A technology that acts as a “bridge” connecting different systems or databases.
A) Middleware
B) Switch
C) Firewall
  • 12. Which integration tool extracts data from a source, transforms it, and loads it into a data warehouse?
A) Load Balancer
B) ETL Tool
C) REST API
  • 13. A central communication backbone that routes, transforms, and manages messages between systems.
A) Enterprise Service Bus (ESB)
B) Data Hub
C) Switchboard
  • 14. This web service protocol is XML-based, secure, but more complex.
A) JSON
B) REST
C) SOAP
  • 15. Tool used to create, secure, publish, and monitor APIs.
A) API Management Tool
B) Compiler
C) CDN
  • 16. A cloud-based integration platform that allows connecting apps without coding.
A) Visual Basic
B) Zapier
C) BIOS
  • 17. Microsoft’s integration tool used to manage enterprise data workflows (part of SQL Server).
A) OneDrive
B) MS DOS
C) SSIS
  • 18. Technology that allows systems to communicate over the internet using standardized protocols.
A) Hypervisor
B) Web Services
C) Router
  • 19. This integration approach reduces errors by enabling real-time, consistent data sharing between systems.
A) Web Caching
B) System Integration
C) Virtualization
  • 20. Example of an API management tool.
A) Postman
B) WinRAR
C) Oracle Java
  • 21. A platform used for message brokering in middleware.
A) VLC
B) MuleSoft
C) Windows Media Player
  • 22. This challenge occurs when systems cannot easily exchange data due to different formats or vendor technologies.
A) Port Forwarding
B) Network Cabling Fault
C) System Compatibility Issue
  • 23. It ensures that data passed during integration is safe through authentication, encryption, and access control.
A) Data Sorting
B) Data Typing
C) Data Security
  • 24. This technologies are frameworks and standards that make systems work together smoothly.
A) Web Services
B) Integration Technologies
C) Middleware
  • 25. is a central communication backbone that allows different applications to interact through a unified bus system.
A) Middleware
B) API Management Tools
C) Enterprise Service Bus (ESB)
  • 26. Apache Camel, Mule ESB, WSO2 ESB is an example of
A) API Management Tools
B) Enterprise Service Bus (ESB)
C) Middleware
  • 27. Used to create, secure, and monitor APIs that connect systems.
A) API Management Tools
B) ETL (Extract, Transform, Load) Tools
C) Cloud-Based Integration Tools
  • 28. Used in data integration — extract data from sources, transform it, and load into a data warehouse.
A) Cloud-Based Integration Tools
B) API Management Tools
C) ETL (Extract, Transform, Load) Tools
  • 29. Allow integration of cloud apps and on-premise systems.
A) API Management Tools
B) Cloud-Based Integration Tools
C) ETL (Extract, Transform, Load) Tools
  • 30. CRM connected with email automation tools
A) Enterprise Integration
B) Data Integration
C) Application Integration
  • 31. the process of combining data from different sources to provide a unified view.
A) Data Migration
B) Data Integration
C) Data Processing
  • 32. The process of moving data from one system to another is known as:
A) Data Conversion
B) Data Cleaning
C) Data Migration
  • 33. When a university combines enrollment, LMS, and library data into a single dashboard, this is an example of:
A) Data Synchronization
B) Data Integration
C) Application Migration
  • 34. Migrating data from MySQL to Azure SQL Database is an example of:
A) Format Migration
B) Database Migration
C) Business Process Migration
  • 35. Which type of data integration involves humans manually copying or importing CSV files?
A) Common Storage Integration
B) Manual Data Integration
C) Middleware-Based Integration
  • 36. Which integration approach uses APIs, webhooks, or microservices to exchange data?
A) Middleware-Based Integration
B) Application-Based Integration
C) Storage Integration
  • 37. A reporting tool that reads data directly from multiple databases without copying it uses:
A) Database Federation
B) Cloud Migration
C) Uniform Data Access Integration
  • 38. Which widely used model copies data from different sources into a central repository like a data warehouse?
A) Common Storage Integration
B) Distributed Storage
C) Uniform Data Access
  • 39. Moving data from local disk storage to cloud storage is an example of:
A) Cloud Transformation
B) System Upgrade
C) Storage Migration
  • 40. Migrating from an on-premise ERP to SAP S/4HANA Cloud is what type of migration?
A) Application Migration
B) Database Migration
C) Business Process Migration
  • 41. The ETL process performs transformations at what stage?
A) After loading
B) Before loading
C) During mapping
  • 42. Which ETL/ELT tool is commonly used in cloud-based transformations?
A) NetBeans
B) AWS Glue
C) MySQL Workbench
  • 43. Duplicate records, incomplete data, and wrong formats are examples of:
A) Integration Errors
B) Data Quality Issues
C) Schema Mismatch
  • 44. Matching fields such as student_fname → first_name refers to:
A) Data Profiling
B) Data Mapping
C) Data Warehousing
  • 45. Which real-world example involves integrating payment gateways, inventory systems, and delivery partners?
A) Government Portals
B) E-commerce Platforms
C) University Enrollment Systems
  • 46. Moving data from MySQL (local server) to Azure SQL Database (cloud). is an example of
A) Data Integration
B) Application-Based Integration
C) Data Migration
  • 47. Company merges and adopts new HR and payroll systems.
A) Cloud Migration
B) Application Migration
C) Business Process Migration
  • 48. What security threat occurs when a hacker intercepts data traveling between integrated systems?
A) API Rate Limiting
B) Injection Attack
C) Man-in-the-Middle (MITM) Attack
  • 49. Which core security control verifies who is trying to access a system?
A) Logging
B) Authorization
C) Authentication
  • 50. Which compliance standard protects the personal data of EU citizens
A) HIPAA
B) GDPR
C) Data Privacy Act of 2012
  • 51. What security mechanism protects data so that only authorized systems can read it, either in transit or at rest?
A) API Gateway
B) Encryption
C) Logging and Monitoring
  • 52. Which integration architecture model follows the principle “Never trust, always verify”?
A) Zero Trust Architecture
B) Firewall Filtering
C) Message Queue
  • 53. exposed publicly without proper security can be exploited.
A) Man-in-the-Middle Attacks (MITM)
B) Data Leakage
C) API Attacks
  • 54. Weak authentication lets attackers enter integrated systems.
A) Injection Attacks
B) Misconfigured Cloud Components
C) Unauthorized Access
  • 55. Sensitive data transferred without encryption gets exposed.
A) Data Leakage
B) API Attacks
C) Injection Attacks
  • 56. Malicious data sent through APIs or middleware to corrupt systems.
A) Misconfigured Cloud Components
B) API Attacks
C) Injection Attacks
  • 57. Cloud-based integrations left public accidentally.
A) Misconfigured Cloud Components
B) Data Leakage
C) Injection Attacks
  • 58. 4111-1111-1111-1234 → --****-1234
A) Data Masking and Tokenization
B) API Security
C) Logging and Monitoring
  • 59. Protects personal data of Filipinos.
A) HIPAA
B) Data Privacy Act 2012
C) ISO 27001
  • 60. Protects confidential health information.
A) HIPAA
B) Data Privacy Act 2012
C) ISO 27001
  • 61. Framework for managing information security.
A) HIPAA
B) ISO 27001
C) Data Privacy Act 2012
  • 62. is the blueprint that outlines how different software applications, systems, and data sources within an organization are connected to work together.
A) Integration Architecture
B) Monolith Architecture
C) N-tier Architecture
  • 63. All-in-one system, single codebase
A) N-tier Architecture
B) Integration Architecture
C) Monolithic Architecture
  • 64. Online banking apps connecting to bank servers
A) Monolithic Architecture
B) N-tier Architecture
C) Client-Server Model
  • 65. Clients request services from a central server
A) Monolithic Architecture
B) N-tier Architecture
C) Client-Server Model
  • 66. Web app (React frontend → Node.js backend → MySQL database)
A) Monolithic Architecture
B) N-tier Architecture
C) Client-Server Model
  • 67. Multi-layer system (presentation, business logic, database)
A) N-tier Architecture
B) Client-Server Model
C) Monolithic Architecture
  • 68. Systems built from independent services
A) Monolithic Architecture
B) Client-Server Model
C) Service-Oriented Architecture
  • 69. Small, independent services communicating via APIs
A) Service-Oriented Architecture
B) Client-Server Model
C) Microservices
  • 70. software layer between OS and applications.
A) Microservices
B) Data Translation
C) Middleware
  • 71. •Converts data formats between different systems.
A) Data Translation
B) Messaging Services
C) Authentication & Authorization
  • 72. a set of rules that allow different software applications to communicate with each other
A) API
B) REST
C) GDPR
  • 73. also called Web Services is an extensively used API over the web and can be easily accessed using the HTTP protocols.
A) API
B) REST
C) WEB API
  • 74. In this type of API, the programmers get the local middleware services.
A) API
B) LOCAL API
C) WEB API
  • 75. It makes a remote program appear to be local by making use of RPCs (Remote Procedural Calls).
A) PROGRAM API
B) WEB API
C) API
  • 76. All systems working together (payment, inventory, shipping) to complete a transaction is an example of:
A) System Isolation
B) Manual Processing
C) System Integration
  • 77. Bank-to-bank communication.
A) REST
B) SOAP
  • 78. Simplifies complex integrations by routing, transforming, and managing messages.
A) WEB services
B) ESB
C) Middleware
  • 79. Talend, Informatica, Microsoft SSIS, Pentaho are examples of
A) ESB
B) ETL
  • 80. Postman, Apigee (Google), Kong, AWS API Gateway are examples of
A) ETL
B) ESB
C) API Management Tools
Created with That Quiz — the site for test creation and grading in math and other subjects.