tailieunhanh - The CISSP Prep Guide Gold Edition phần 5

Bạn có thể tìm thấy câu trả lời cho các câu hỏi sau đây trong Phụ lục H. 1. Một kho dữ liệu là gì? a. Một cơ sở từ xa được sử dụng để lưu trữ băng sao lưu b. Một kho thông tin từ cơ sở dữ liệu không đồng nhất c. Một bảng trong một hệ thống cơ sở dữ liệu quan hệ d. Sao lưu nóng toà nhà | Applications and Systems Development 363 Sample Questions You can find answers to the following questions in Appendix H. 1. What is a data warehouse a. A remote facility used for storing backup tapes b. A repository of information from heterogeneous databases c. A table in a relational database system d. A hot backup building 2. What does normalizing data in a data warehouse mean a. Redundant data is removed. b. Numerical data is divided by a common factor. c. Data is converted to a symbolic representation. d. Data is restricted to a range of values. 3. What is a neural network a. A hardware or software system that emulates the reasoning of a human expert b. A collection of computers that are focused on medical applications c. A series of networked PCs performing artificial intelligence tasks d. A hardware or software system that emulates the functioning of biological neurons 4. A neural network learns by using various algorithms to a. Adjust the weights applied to the data. b. Fire the rules in the knowledge base. c. Emulate an inference engine. d. Emulate the thinking of an expert. 5. The SEI Software Capability Maturity Model is based on the premise that a. Good software development is a function of the number of expert programmers in the organization. b. The maturity of an organization s software processes cannot be measured. c. The quality of a software product is a direct function of the quality of its associated software development and maintenance processes. d. Software development is an art that cannot be measured by conventional means. 364 The CISSP Prep Guide Gold Edition 6. In configuration management a configuration item is a. The version of the operating system that is operating on the work station that provides information security services. b. A component whose state is to be recorded and against which changes are to be progressed. c. The network architecture used by the organization. d. A series of files that contain sensitive information. 7. In an

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.