Which of the following is not provided by “Deep Web”?
a) Database generated Web pages
b) Private or limited access Web pages
c) Pages without links
d) All of the mentioned

1 Answer

Answer :

All of the

Related questions

Description : Which of the following is not provided by “Deep Web”? a) Database generated Web pages b) Private or limited access Web pages c) Pages without links d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned

Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable

Description : Applications such as a Web server or database server that can run on a virtual machine image are referred to as ______________ a) virtual server b) virtual appliances c) machine imaging d) all of the mentioned

Last Answer : virtual appliances

Description : Applications such as a Web server or database server that can run on a virtual machine image are referred to as ______________ a) virtual server b) virtual appliances c) machine imaging d) all of the mentioned

Last Answer : virtual appliances

Description : Applications such as a Web server or database server that can run on a virtual machine image are referred to as ______________ a) virtual server b) virtual appliances c) machine imaging d) all of the mentioned

Last Answer : virtual appliances

Description : An enterprise needs highly controlled storage and access to their databases as well as managing the infrastructure for web front ends and other applications. They have a large existing IT infrastructure and they ... to reduce cost? A. public cloud B. hybrid cloud C. private cloud D. internal cloud

Last Answer : hybrid cloud

Description : Point out the wrong statement. CSE-R17.BLOGSPOT.COM a) SOA provides the standards that transport the messages and makes the infrastructure to support it possible b) SOA provides access ... and widely shareable components that can minimize developer and infrastructure costs d) None of the mentioned

Last Answer : SOA provides access to reusable Web services over an SMTP network

Description : Point out the wrong statement. a) SOA provides the standards that transport the messages and makes the infrastructure to support it possible b) SOA provides access to reusable Web services ... widely shareable components that can minimize developer and infrastructure costs d) None of the mentioned

Last Answer : SOA provides access to reusable Web services over an SMTP network

Description : Which component of web 2.0 allow reloading a part of webpage without reloading the whole page a)Folksonomy b) Ajax c)Mash up d) RSS generated Syndication

Last Answer : Ajax

Description : The Hadoop MapReduce framework spawns one map task for each __________ generated by the InputFormat for the job. a) OutputSplit b) InputSplit c) InputSplitStream d) All of the mentioned

Last Answer : ) InputSplit

Description : Point out the wrong statement. a) Wolf Frameworks uses a C# engine and supports both Microsoft SQL Server and MySQL database b) Applications built in Wolf are 50-percent browser-based ... and multisource overlaid content c) Google applications are cloud-based applications d) None of the mentioned

Last Answer : Applications built in Wolf are 50-percent browser-based and support mashable and multisource overlaid content

Description : Point out the wrong statement. a) Wolf Frameworks uses a C# engine and supports both Microsoft SQL Server and MySQL database b) Applications built in Wolf are 50-percent browser-based ... and multisource overlaid content c) Google applications are cloud-based applications d) None of the mentioned

Last Answer : Applications built in Wolf are 50-percent browser-based and support mashable and multisource overlaid content

Description : Which resources are typically provided by an Infrastructure as a Service cloud computing delivery model? A. applications B. virtual machines C. virtual private networks D. middleware software stacks

Last Answer : middleware software stacks

Description : Which resources are typically provided by an Infrastructure as a Service cloud computing delivery model? A. applications B. virtual machines C. virtual private networks D. middleware software stacks

Last Answer : virtual machines

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.

Last Answer : Illegal access to private data stored by applications in the cloud.

Description : Which statement is true about the security of the cloud computing environment? A. It is compromised because it is a shared environment. B. Multitenant applications are not able to run in a cloud ... a private cloud. D. Access to critical data is better controlled in a private cloud environment.

Last Answer : Access to critical data is better controlled in a private cloud environment

Description : Point out the wrong statement. a) Large cloud providers with geographically dispersed sites worldwide, therefore, achieve reliability rates that are hard for private systems to achieve b) Private data ... ) A network backbone is a very low-capacity network connection d) None of the mentioned

Last Answer : A network backbone is a very low-capacity network connection

Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Data Privacy

Description : __________ cloud is one where the cloud has been organized to serve a common function or purpose. a) Public b) Private c) Community d) All of the mentioned

Last Answer : Community

Description : The ________ cloud infrastructure is operated for the exclusive use of an organization. a) Public b) Private c) Community d) All of the mentioned

Last Answer : Private

Description : Which of the following model type is not trusted in terms of security? a) Public b) Private c) Hybrid d) None of the mentioned

Last Answer : Private/Community

Description : Which of the following service model is owned in terms of infrastructure by both vendor and customer? a) Public b) Private c) Hybrid d) None of the mentioned

Last Answer : Hybrid

Description : Which of the following cloud does not require mapping? a) Public b) Private c) Hybrid d) None of the mentioned

Last Answer : Public

Description : How many types of virtual private server instances are partitioned in an IaaS stack? a) One b) Two c) Three d) All of The Mentioned

Last Answer : Three

Description : Which of the following is the deployment model? a) public b) private c) hybrid d) all of the mentioned

Last Answer : all of the mentioned

Description : Which of the following is provided by Identity as a Service? a) Identity governance b) Provisioning c) Risk and event monitoring d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following benefit is provided by the PaaS service provider? a) A larger pool of qualified developers b) More reliable operation c) A logical design methodology d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is provided by ownership dimension of Cloud Cube Model? a) Proprietary b) Owner c) P d) All of the mentioned

Last Answer : Owner

Description : Which of the following figure correctly describe major features provided by Google App Engine? a) b) c)d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following benefit is provided by the PaaS service provider? a) A larger pool of qualified developers b) More reliable operation c) A logical design methodology d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is incorrect? a) A Layered-style program is divided into an array of modules or layers b) Each layer provides services to the layer “below” and makes use of services provided by the layer “above” c) All of the mentioned d) None of the mentioned

Last Answer : Each layer provides services to the layer “below” and makes use of services provided by the layer “above”

Description : Which of the following benefit is provided by the PaaS service provider? a) A larger pool of qualified developers b) More reliable operation c) A logical design methodology d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following figure correctly describe major features provided by Google App Engine? a) b) c) d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following allows you to create instances of the MySQL database to support your Web sites? a) Amazon Elastic Compute Cloud b) Amazon Simple Queue Service c) Amazon Relational Database Service d) Amazon Simple Storage System

Last Answer : Amazon Relational Database Service

Description : Which of the following is an edge-storage or content-delivery system that caches data in different physical locations? a) Amazon Relational Database Service b) Amazon SimpleDB c) Amazon Cloudfront d) Amazon Associates Web Services

Last Answer : Amazon Cloudfront

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Which of the following is authorization markup language? a) eXtensible Access Control Markup Language b) intrinsic Access Control Markup Language c) hypertext Access Control Markup Language d) all of the mentioned

Last Answer : eXtensible Access Control Markup Language

Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned

Last Answer : REST stands for Representational State Transfer

Description : Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage? a) On-demand self-service b) Broad network access c) Resource pooling d) All of the mentioned

Last Answer : On-demand self-service

Description : _________ model consists of the particular types of services that you can access on a cloudcomputing platform. a) Service b) Deployment c) Application d) None of the mentioned

Last Answer : Service

Description : Which of the following provide system resource access to virtual machines? a) VMM b) VMC c) VNM d) All of the mentioned

Last Answer : VMM

Description : Which of the following provide system resource access to virtual machines? a) VMM b) VMC c) VNM d) All of the mentioned

Last Answer : VMM

Description : Which of the following disk operation is performed When a tenant is granted access to a virtual storage container? a) CRUD b) File system modifications c) Partitioning d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Securing data sent to, received from, and stored in the cloud is the single largest security concern b) The problem with the data you store in the cloud is that ... the cloud from direct client access is to create layered access to the data d) All of the mentioned

Last Answer : One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data

Description : Which of the following is a key mechanism for protecting data? a) Access control b) Auditing c) Authentication d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is considered an essential element in cloud computing by CSA? a) Multi-tenancy b) Identity and access management c) Virtualization d) All of the mentioned

Last Answer : Virtualization

Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned

Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications

Description : Which of the following factors might offset the cost of offline access in hybrid applications? a) scalability b) costs c) ubiquitous access d) all of the mentioned

Last Answer : all of the mentioned