Skip to content

Latest commit

 

History

History
276 lines (171 loc) · 6.01 KB

File metadata and controls

276 lines (171 loc) · 6.01 KB

Enterprise Security and Compliance Architecture - Assessment Quiz

Instructions

  • Questions: 15 questions
  • Time Limit: 45 minutes
  • Passing Score: 80% (12/15 correct)
  • Attempts: Unlimited retakes with randomized questions
  • Format: Multiple choice, multiple select, and scenario-based

Quiz Questions

Question 1: Foundational Concepts

Question: Which of the following best describes Zero-Trust?

A) [Option A] B) [Option B] C) [Option C] D) [Option D]

Correct Answer: [Letter]

Explanation: [Why this is correct and others are wrong]


Question 2: Architecture Patterns

Question: When designing a system with [specific requirements], which architecture pattern is most appropriate?

A) [Pattern 1] B) [Pattern 2] C) [Pattern 3] D) [Pattern 4]

Correct Answer: [Letter]

Explanation: [Rationale for pattern selection]


Question 3: Trade-offs Analysis

Question: What are the main trade-offs when choosing [Option A] versus [Option B] for [use case]?

A) Cost vs Performance B) Scalability vs Complexity C) Security vs Usability D) All of the above

Correct Answer: [Letter]

Explanation: [Discussion of trade-offs]


Question 4: Best Practices (Multiple Select)

Question: Which of the following are best practices for GDPR? (Select all that apply)

☐ A) [Best practice 1] ☐ B) [Best practice 2] ☐ C) [Anti-pattern 1] ☐ D) [Best practice 3] ☐ E) [Anti-pattern 2]

Correct Answers: [Letters]

Explanation: [Why each is correct or incorrect]


Question 5: Scenario-Based

Scenario: You are architecting a [system type] for a [company type] with the following requirements:

  • Requirement 1: [Detail]
  • Requirement 2: [Detail]
  • Requirement 3: [Detail]
  • Constraint: [Budget/timeline/resource constraint]

Question: What would be your recommended approach?

A) [Approach 1 with brief description] B) [Approach 2 with brief description] C) [Approach 3 with brief description] D) [Approach 4 with brief description]

Correct Answer: [Letter]

Explanation: [Detailed rationale considering requirements and constraints]


Question 6: Tool Selection

Question: Which tool would you recommend for [specific use case] in an enterprise environment?

A) [Tool A] - [Brief description] B) [Tool B] - [Brief description] C) [Tool C] - [Brief description] D) [Tool D] - [Brief description]

Correct Answer: [Letter]

Explanation: [Why this tool is best suited]


Question 7: Cost Optimization

Question: A company is spending $500K/month on [infrastructure component]. Which optimization strategy would likely yield the highest savings?

A) [Strategy 1] B) [Strategy 2] C) [Strategy 3] D) [Strategy 4]

Correct Answer: [Letter]

Explanation: [Analysis of each strategy's impact]


Question 8: Security and Compliance

Question: When designing for [compliance requirement], which architectural approach is required?

A) [Approach 1] B) [Approach 2] C) [Approach 3] D) [Approach 4]

Correct Answer: [Letter]

Explanation: [Compliance requirements and rationale]


Question 9: Scalability

Question: To scale [system component] from 100 to 10,000 [unit], which bottleneck must be addressed first?

A) [Bottleneck 1] B) [Bottleneck 2] C) [Bottleneck 3] D) [Bottleneck 4]

Correct Answer: [Letter]

Explanation: [Analysis of scalability constraints]


Question 10: Architecture Decision

Question: When would you choose [Option A] over [Option B] for [use case]?

A) When [condition 1] B) When [condition 2] C) When [condition 3] D) Never; [Option B] is always better

Correct Answer: [Letter]

Explanation: [Context-dependent decision factors]


Question 11: Communication Strategy

Question: When presenting [technical decision] to [stakeholder type], what should you emphasize?

A) [Technical details] B) [Business value] C) [Implementation complexity] D) [Alternative options]

Correct Answer: [Letter]

Explanation: [Stakeholder-appropriate communication]


Question 12: Monitoring and Operations

Question: What is the minimum set of metrics needed to monitor [system component] effectively?

A) [Metric set 1] B) [Metric set 2] C) [Metric set 3] D) [Metric set 4]

Correct Answer: [Letter]

Explanation: [Rationale for metric selection]


Question 13: Disaster Recovery

Question: For a system with RTO=4 hours and RPO=1 hour, which DR strategy is appropriate?

A) [Strategy 1] B) [Strategy 2] C) [Strategy 3] D) [Strategy 4]

Correct Answer: [Letter]

Explanation: [Analysis of RTO/RPO requirements]


Question 14: Integration Patterns

Question: When integrating [System A] with [System B] in an enterprise environment, which pattern provides the best decoupling?

A) [Pattern 1] B) [Pattern 2] C) [Pattern 3] D) [Pattern 4]

Correct Answer: [Letter]

Explanation: [Rationale for integration pattern]


Question 15: Future-Proofing

Question: Which architectural decision best prepares [system] for [future requirement]?

A) [Decision 1] B) [Decision 2] C) [Decision 3] D) [Decision 4]

Correct Answer: [Letter]

Explanation: [Long-term implications analysis]


Scoring Guide

  • 15/15 (100%): Excellent! Deep understanding demonstrated
  • 13-14/15 (87-93%): Strong understanding with minor gaps
  • 12/15 (80%): Passing score, meets minimum requirements
  • 10-11/15 (67-73%): Review materials and retake
  • <10/15 (<67%): Significant gaps, review module content

Next Steps

If You Passed (≥12/15)

✅ Proceed to exercises ✅ Begin related projects ✅ Move to next module

If You Need to Retake (<12/15)

  1. Review lecture notes, focusing on questions missed
  2. Complete additional exercises
  3. Study resources in resources.md
  4. Retake quiz (questions will be randomized)

Answer Key

Answer key is available in the solutions repository

Feedback

Found an error in a question? Submit an issue or pull request.


Passed the quiz?Proceed to exercises