Which of the following is the most commonly used standard for performing
synchronization?
a) SyncML
b) SMIL
c) SML
d) None of the mentioned

1 Answer

Answer :

SyncML

Related questions

Description : The technology used to distribute service requests to resources is referred to as _____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned

Last Answer : load balancing

Description : The technology used to distribute service requests to resources is referred to as_____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned

Last Answer : load balancing

Description : The technology used to distribute service CSE-R17.BLOGSPOT.COM requests to resources is referred to as_____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned

Last Answer : load balancing

Description : The technology used to distribute service requests to resources is referred to as _____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned

Last Answer : load balancing

Description : The most commonly used set of protocols uses ______ as the messaging format. a) XML b) JSON c) BSON d) All of the mentioned

Last Answer : XML

Description : Which of the following is commonly used to describe the service interface, how to bind information, and the nature of the component’s service or endpoint? a) WSDL b) SCDL c) XML d) None of the mentioned

Last Answer : WSDL

Description : Which of the following is commonly used to describe the service interface, how to bind information, and the nature of the component’s service or endpoint? a) WSDL b) SCDL c) XML d) None of the mentioned

Last Answer : WSDL

Description : _________ is used for merchant transactions under the Payment Card Industry Data Security Standard. a) ClearPoint PCI b) ClearSoln c) Rackserve PCI d) All of the mentioned

Last Answer : ClearPoint PCI

Description : Which of the following standard is concerned with the exchange and control of identity information? a) IGK b) IDF c) IGF d) All of the mentioned

Last Answer : IGF

Description : Any software application that complies with the standard accepts a _______ that is authenticated by a trusted provider. a) OpenID b) OpenUser c) OpenSSD d) None of the mentioned

Last Answer : OpenID

Description : A _______ system uses components to assemble services that can be tailored for a specific purpose using standard parts. a) reliable b) scalable c) composable d) none of the mentioned

Last Answer : composable

Description : Point out the wrong statement. a) Virtual appliances are becoming a very important standard cloud computing deployment object b) Cloud computing requires some standard protocols c) Cloud computing relies on a set of protocols needed to manage interprocess communications d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the correct statement. a) A standard machine instance (virtual computer) might cost $0.10 or less an hour b) A typical storage charge might be $0.10 per GB/month c) Outsourcing shifts the burden of capital expenditures onto the service provider d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following standard connect distributed hosts or tenants to their provisioned storage in the cloud? a) CDMI b) OCMI c) COA d) All of the mentioned

Last Answer : CDMI

Description : Which of the following is the standard for interoperable cloud-based key management? a) KMIP b) PMIK c) AIMK d) None of the mentioned

Last Answer : KMIP

Description : Which of the following are a common means for losing encrypted data? a) lose the keys b) lose the encryption standard c) lose the account d) all of the mentioned

Last Answer : lose the keys

Description : Which of the following is a compliance standard? a) PCI-DSS b) HIPPA c) GLBA d) All of the mentioned

Last Answer : All of the mentioned

Description : The standard for deploying web services on the Java EE platform as of Java EE 1.4:- a) JAX-RPC b) JAX c) RPC d) None of the mentioned

Last Answer : JAX-RPC

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following standard connect distributed hosts or tenants to their provisioned storage in the cloud? a) CDMI b) OCMI c) COA d) All of the mentioned

Last Answer : CDMI

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : Balancing the workload by transferring the under performing servers is a feature of ___________. A. High availability. B. Operational automation. C. Dynamic resource. D. Live Migration

Last Answer : Live Migration

Description : ________ is a framework for performing remote procedure calls and data serialization. a) Drill b) BigTop c) Avro d) Chukwa

Last Answer : Avro

Description : My medical smil has started to bloom and I feel like it is drying up (even if I water it). I read somewhere that after flowering it is necessary to use a reciprocating cut - what is it and how ... , I state that I started with kitchen herbs for the first time this year. Thank you for answer. Karel.

Last Answer : Backcut - pruning of shoots. If it is done after flowering, it is pruned about 10 - 50%, but - I admit, I do not grow smil. : o As for the "drying" - the cause may be an excessive load ... is carried out after flowering), but also overwetting (lack of light, lack of fertilizer) - I do not estimate.

Description : Header of a frame generally contains a. synchronization bytes b. addresses c. frame identifier d. all of the mentioned

Last Answer : d. all of the mentioned

Description : Header of a Layer two frame usually contain ______________ A. synchronization bytes B. addresses C. frame identifier D. all of the mentioned

Last Answer : D. all of the mentioned

Description : The most commonly used model for discovery and description used with SOAP messaging is the? A. WSDL B. VMc C. DHML D. SOA

Last Answer : WSDL

Description : What is most commonly used for managing the resources for every virtual system? a) Load balancer b) Hypervisor c) Router d) Cloud

Last Answer : Hypervisor

Description : What is most commonly used for managing the resources for every virtual system? a) Load balancer b) Hypervisor c) Router d) Cloud

Last Answer : Hypervisor

Description : Email is _________ A. Loss-tolerant application B. Bandwidth-sensitive application C. Elastic application D. None of the mentioned

Last Answer : C. Elastic application

Description : Which of the following network resources can be load balanced? a) Connections through intelligent switches b) DNS c) Storage resources d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Which of the following correctly represents different types of mobile patterns? a) b) c) d) All of the mentioned

Last Answer : a)

Description : Which of the following is a PCI CaaS service? a) FedCloud b) ClearSoln c) Rackserve PCI d) All of the mentioned

Last Answer : ) Rackserve PCI

Description : Which of the following can be used for the banking industry? a) athenahealth b) bankserve c) bankingsol d) all of the mentioned

Last Answer : bankserve

Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned

Last Answer : A Compliance as a Service application would need to serve as a trusted third party

Description : Which of the following is a man-in-the-middle type of service? a) CaaS b) IaaS c) AaaS d) All of the mentioned

Last Answer : CaaS

Description : Which of the following allows a distributed ID system to write and enforce custom policy expressions? a) XACML b) XML c) SOAP d) None of the mentioned

Last Answer : XACML

Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned

Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable

Description : Which of the following is an example of a vertical cloud that advertise CaaS capabilities? a) FedCloud b) ClearPoint PCI c) Rackserve PCI d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following should come in place of question mark for the following figure? a) Policy Enforcement Point b) Policy Decision Pointc) Policy Insertion Point d) All of the mentioned

Last Answer : Policy Decision Point

Description : Which of the following is authorization markup language? a) eXtensible Access Control Markup Language b) intrinsic Access Control Markup Language c) hypertext Access Control Markup Language d) all of the mentioned

Last Answer : eXtensible Access Control Markup Language

Description : The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service. a) Higgins b) Hughes c) Hinges d) All of the mentioned

Last Answer : Higgins

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : Which of the following allows a distributed ID system to write and enforce custom policy expressions? a) XACML b) XML c) SOAP d) None of the mentioned

Last Answer : XACML

Description : Point out the wrong statement. a) XML checks the ID request against its policies and either allows or denies the request b) SPML in most instances operates as a reply/request mechanism c) User centric authentication takes place usually in the form of knowledge cards d) All of the mentioned

Last Answer : SPML in most instances operates as a reply/request mechanism

Description : Which of the following is provided by Identity as a Service? a) Identity governance b) Provisioning c) Risk and event monitoring d) All of the mentioned

Last Answer : All of the mentioned

Description : _________ is one of the more expensive and complex areas of network computing. a) Multi-Factor Authentication b) Fault tolerance c) Identity protection d) All of the mentioned

Last Answer : Identity protection