The original OpenID authentication protocol was developed in _________ by
_________
a) May 2004, Charles
b) May 2003, Brad Fiper
c) May 2005, Brad Fitzpatrick
d) May 2005, Charles Brad

1 Answer

Answer :

May 2005, Brad Fitzpatrick

Related questions

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : Point out the wrong statement. A. Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems B. The Distributed Audit ... CardSpace specifications support the authentication type of data object D. All of the above

Last Answer : The OpenID and CardSpace specifications support the authentication type of data object

Description : ___________is an open protocol, initiated by Blaine Cook and Chris Messina, to allow secure API authorization in a simple, standardized method for various types of web applications. a) OAuth b) OpenID c) SAMIL d) LID

Last Answer : OAuth

Description : _________ is one of the more expensive and complex areas of network computing. a) Multi-Factor Authentication b) Fault tolerance c) Identity protection d) All of the mentioned

Last Answer : Identity protection

Description : Any software application that complies with the standard accepts a _______ that is authenticated by a trusted provider. a) OpenID b) OpenUser c) OpenSSD d) None of the mentioned

Last Answer : OpenID

Description : It offers users to login into multiple websites with single account. A. FIDM B. OpenID C. SSO D. Identity

Last Answer : OpenID

Description : First T20 was played between New Zealand and Australia on ___________. A. 17 February 2004 B. 17 February 2003 C. 17 February 2005 D. 17 February 2006

Last Answer : ANSWER: C

Description : First T20 was played between New Zealand and Australia on ___________. A. 17 February 2005 B. 17 February 2004 C. 17 February 2003 D. 17 February 2006

Last Answer : ANSWER: A

Description : First T20 was played between New Zealand and Australia on ___________. A. 17 February 2004 B. 17 February 2003 C. 17 February 2005 D. 17 February 2006

Last Answer : ANSWER: C

Description : First T20 was played between New Zealand and Australia on ___________. A. 17 February 2005 B. 17 February 2004 C. 17 February 2003 D. 17 February 2006

Last Answer : ANSWER: A

Description : THE RIGHT TO INFORMATION ACT WAS PASSED IN THE YEAR a) 2003 b) 2005 c) 2004 d) 2002

Last Answer : b) 2005

Description : Tsunami in the Indian Ocean occurred in the year (a) 2003 (b) 2004 (c) 2005 (d) 2006

Last Answer : (b) 2004

Description : Food for Work Programme was launched in which of the following years? (a) 2003 (b) 2001 (c) 2004 (d) 2005

Last Answer : (c) 2004

Description : An input field takes the year of birth between 1900 and 2004 The boundary values for testing this field are A. 0,1900,2004,2005 B. 1900, 2004 C. 1899,1900,2004,2005 D. 1899, 1900, 1901,2003,2004,2005

Last Answer : C. 1899,1900,2004,2005

Description : The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service. a) Higgins b) Hughes c) Hinges d) All of the mentioned

Last Answer : Higgins

Description : Point out the wrong statement. a) XML checks the ID request against its policies and either allows or denies the request b) SPML in most instances operates as a reply/request mechanism c) User centric authentication takes place usually in the form of knowledge cards d) All of the mentioned

Last Answer : SPML in most instances operates as a reply/request mechanism

Description : __________ authentication requires the outside use of a network security or trust service. a) SSO b) Singlefactor c) Multi Factor d) All of the mentioned

Last Answer : Multi Factor

Description : More secure authentication requires the use of at least? A. two-factor authentication. B. three-factor authentication. C. four-factor authentication. D. None of the above

Last Answer : two-factor authentication

Description : What is true about SSO? A. SSO has multiple authentication server B. SSO managing single accesses to other systems C. In SSO, User sends the ticket to intranet server. D. All of the above

Last Answer : In SSO, User sends the ticket to intranet server.

Description : _____ has single authentication server, managing multiple accesses to other systems A. SSO B. IDaaS C. SOAP D. SOA

Last Answer : SSO

Description : Which of the following is a key mechanism for protecting data? a) Access control b) Auditing c) Authentication d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is built on top of a Hadoop framework using the Elastic Compute Cloud? a) Amazon Elastic MapReduce b) Amazon Mechanical Turkc) Amazon DevPay d) Multi-Factor Authentication

Last Answer : Amazon Elastic MapReduce

Description : Which of the following is a means for accessing human researchers or consultants to help solve problems on a contractual or temporary basis? a) Amazon Elastic MapReduce b) Amazon Mechanical Turk c) Amazon DevPay d) Multi-Factor Authentication

Last Answer : Amazon Mechanical Turk

Description : Which of the following is a billing and account management service? a) Amazon Elastic MapReduce b) Amazon Mechanical Turk c) Amazon DevPay d) Multi-Factor Authentication

Last Answer : Amazon DevPay

Description : Which of the following techniques can be used for optimizing backed up data space? a) Encryption and Deduplication b) Compression and Deduplication c) Authentication and Deduplication d) Deduplication only

Last Answer : Compression and Deduplication

Description : To read a file in HDFS, a user sends an _______ request to the NameNode toget the location of file blocks. a) access b) open c) authentication d) create

Last Answer : open

Description : Which of the following techniques can be used for optimizing backed up data space? a) Encryption and Deduplication b) Compression and Deduplication c) Authentication and Deduplication d) Deduplication only

Last Answer : Compression and Deduplication

Description : In which year, Amazon Web Services founded? A. 2005 B. 2006 C. 2007 D. 2008

Last Answer : 2006

Description : Which of the following is Type 1 Hypervisor? A. Wind River Simics B. Virtual Server 2005 R2 C. KVM D. LynxSecure

Last Answer : LynxSecure

Description : Which of the following is Type 1 Hypervisor? a) Wind River Simics b) Virtual Server 2005 R2c) KVM d) LynxSecure

Last Answer : LynxSecure

Description : Which of the following is Type 1 Hypervisor? a) Wind River Simics b) Virtual Server 2005 R2 c) KVM d) LynxSecure

Last Answer : LynxSecure

Description : For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer. a) SaaS b) PaaS c) IaaS d) All of the mentioned

Last Answer : PaaS

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol

Last Answer : A) SSL handshake protocol

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : A) SSL handshake protocol

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : he primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : The consumer protection act 1986 amended in 2002 came into force wef a) 15 Apr 2002 b) 15 Mar 2003 c) 15 Apr 2005 d) None of these 

Last Answer : b) 15 Mar 2003

Description : The Disaster Management Act was made in (a) 2006 (b) 2003 (c) 2005 (d) 2009

Last Answer : (c) 2005

Description : The Disaster Management Act was made in? a. 2006 b. 2003 c. 2005 d. 2009

Last Answer : c. 2005

Description : What is the average number of candidates who did not qualify in the exam in the years 2003 and 2005? A. 576 B. 556 C. 528 D. 546 E. None of the Above

Last Answer : C. 528

Description : Which of the following is based on the IETF Session Initiation Protocol? a) WSDL b) SIMPLE c) SOAP d) All of the mentioned

Last Answer : SIMPLE

Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned

Last Answer : REST stands for Representational State Transfer

Description : Communication between services is done widely using _______ protocol. a) REST b) SOAP c) RESTful d) None of the mentioned

Last Answer : SOAP

Description : Point out the wrong statement. A. Yahoo Exchange platform added features to compete with Notes B. SIP stands for Session Initiation Protocol C. Citrix GoToMeeting is one of the best-known collaboration software product D. All of the above

Last Answer : Yahoo Exchange platform added features to compete with Notes

Description : Which of the following is an open standard protocol.? A. SIMPLE B. WSDL C. DHML D. SOAP

Last Answer : SIMPLE

Description : Which of the following protocol is not an Internet Engineering Task Force standard? a) SIP b) SIMPLE c) XMPP d) IMPS

Last Answer : IMPS

Description : Which of the following protocol is adopted for interoperability by top three IM service providers?a) SIP b) SIMPLE c) XMPP d) IMPS

Last Answer : SIMPLE

Description : Point out the correct statement. a) Every third-party IM clients aim to allow their users to connect to the different major IM services b) SIP stands for Secure Initiation Protocol c) XMPP stands for Extensible Messaging and Presence Protocol d) All of the mentioned

Last Answer : XMPP stands for Extensible Messaging and Presence Protocol