Description : The marshaller used by MarshallingView belongs to one of a series of XML marshallers. a) Jaxb2Marshaller b) XmlBeansMarshaller c) CastorMarshalle d) All of the mentioned
Last Answer : All of the mentioned
Description : General-purpose class that allows a response to be rendered using a marshaller. a) MarshallingView b) Marshalling c) View d) All of the mentioned
Last Answer : MarshallingView
Description : In the case of classesToBeBound, the classes assigned to this property, indicate the class (i.e., object) structure that is to be transformed into XML. a) True b) False
Last Answer : True
Description : Annotation which allows the Jaxb2Marshaller marshaller to detect a class’s (i.e., object’s) fields. a) @XmlRootElement b) @XmlRoot c) @NotNull d) None of the mentioned
Last Answer : @XmlRootElement
Description : Management Software is used for? A. It helps to maintain and configure the infrastructure. B. It helps to deploy and integrate the application on the cloud. C. Both A and B D. None of the above
Last Answer : It helps to maintain and configure the infrastructure.
Description : Google cloud SQL Features a) Lets your application read files from and write files to buckets in Google cloud storage b) A Fully -managed web service that allows you to create , ... large applications into logical components that can be share stateful services and communicate in secure fashion.
Last Answer : A Fully –managed web service that allows you to create , configure , and use relational databases that live in Google’s cloud
Description : The __________ model originally did not require a cloud to use virtualization to pool resources. a) NEFT b) NIST c) NIT d) All of the mentioned
Last Answer : NIST
Description : Which of the following cloud does not require mapping? a) Public b) Private c) Hybrid d) None of the mentioned
Last Answer : Public
Description : Which model originally did not require a cloud to use virtualization to pool resources a) NEFT b) NIST c) NIT d) All of the mentioned
Description : Which of the following are true characteristics of SaaS service model? A. The software applications are maintained by the vendor. B. They can be scaled up or down on demand. C. SaaS applications are cost-effective since they do not require any maintenance at end user side. D. All of the above
Last Answer : All of the above
Description : Hadoop achieves reliability by replicating the data across multiple hosts and hence does not require ________ storage on hosts. a) RAID b) Standard RAID levels c) ZFS d) Operating system
Last Answer : RAID
Description : A marshaller crosses his/her hands in front of the face, palms outward and then moves the arms outwards. What does the signal indicate? a. Clear to move forward b. Brakes off c. Remove chocks d. Clear to close all engines
Last Answer : c. Remove chocks
Description : Email is _________ A. Loss-tolerant application B. Bandwidth-sensitive application C. Elastic application D. None of the mentioned
Last Answer : C. Elastic application
Description : Which of the following network resources can be load balanced? a) Connections through intelligent switches b) DNS c) Storage resources d) All of the mentioned
Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned
Description : The technology used to distribute service requests to resources is referred to as _____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned
Last Answer : load balancing
Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned
Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned
Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users
Description : Which of the following correctly represents different types of mobile patterns? a) b) c) d) All of the mentioned
Last Answer : a)
Description : _________ is used for merchant transactions under the Payment Card Industry Data Security Standard. a) ClearPoint PCI b) ClearSoln c) Rackserve PCI d) All of the mentioned
Last Answer : ClearPoint PCI
Description : Which of the following is a PCI CaaS service? a) FedCloud b) ClearSoln c) Rackserve PCI d) All of the mentioned
Last Answer : ) Rackserve PCI
Description : Which of the following can be used for the banking industry? a) athenahealth b) bankserve c) bankingsol d) all of the mentioned
Last Answer : bankserve
Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned
Last Answer : A Compliance as a Service application would need to serve as a trusted third party
Description : Which of the following is a man-in-the-middle type of service? a) CaaS b) IaaS c) AaaS d) All of the mentioned
Last Answer : CaaS
Description : Which of the following allows a distributed ID system to write and enforce custom policy expressions? a) XACML b) XML c) SOAP d) None of the mentioned
Last Answer : XACML
Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned
Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable
Description : Which of the following is an example of a vertical cloud that advertise CaaS capabilities? a) FedCloud b) ClearPoint PCI c) Rackserve PCI d) All of the mentioned
Description : Which of the following should come in place of question mark for the following figure? a) Policy Enforcement Point b) Policy Decision Pointc) Policy Insertion Point d) All of the mentioned
Last Answer : Policy Decision Point
Description : Which of the following is authorization markup language? a) eXtensible Access Control Markup Language b) intrinsic Access Control Markup Language c) hypertext Access Control Markup Language d) all of the mentioned
Last Answer : eXtensible Access Control Markup Language
Description : The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service. a) Higgins b) Hughes c) Hinges d) All of the mentioned
Last Answer : Higgins
Description : Which of the following standard is concerned with the exchange and control of identity information? a) IGK b) IDF c) IGF d) All of the mentioned
Last Answer : IGF
Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned
Last Answer : The OpenID and
Description : Point out the wrong statement. a) XML checks the ID request against its policies and either allows or denies the request b) SPML in most instances operates as a reply/request mechanism c) User centric authentication takes place usually in the form of knowledge cards d) All of the mentioned
Last Answer : SPML in most instances operates as a reply/request mechanism
Description : Any software application that complies with the standard accepts a _______ that is authenticated by a trusted provider. a) OpenID b) OpenUser c) OpenSSD d) None of the mentioned
Last Answer : OpenID
Description : Which of the following is provided by Identity as a Service? a) Identity governance b) Provisioning c) Risk and event monitoring d) All of the mentioned
Description : _________ is one of the more expensive and complex areas of network computing. a) Multi-Factor Authentication b) Fault tolerance c) Identity protection d) All of the mentioned
Last Answer : Identity protection
Description : ________ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks. a) Internet Hardware Addresses b) Ethernet Software Addresses c) Ethernet Hardware Addresses d) None of the mentioned
Last Answer : Ethernet Hardware Addresses
Description : __________ authentication requires the outside use of a network security or trust service. a) SSO b) Singlefactor c) Multi Factor d) All of the mentioned
Last Answer : Multi Factor
Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned
Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses
Description : Which of the following attribute should be unique? a) identity b) digital identity c) mashup d) all of the mentioned
Last Answer : digital identity
Description : Which of the following group is dedicated to support technologies that implement enterprise mashups? a) Open Alliance Apache b) Open Mashup Alliance c) Open Tech Alliance d) None of the mentioned
Last Answer : Open Mashup Alliance
Description : Point out the correct statement. a) Mashups are an incredibly useful hybrid Web application b)SaaS will eventually replace all locally installed software c) The establishment and proof of identity is a central network function d) All of the mentioned
Description : The componentized nature of SaaS solutions enables many solutions to support a feature called _____________ a) workspace b) workloads c) mashups d) all of the mentioned
Last Answer : mashups
Description : Open source software used in a SaaS is called _______ SaaS. a) closed b) free c) open d) all of the mentioned
Last Answer : open
Description : SaaS supports multiple users and provides a shared data model through _________ model. a) single-tenancy b) multi-tenancy c) multiple-instance d) all of the mentioned
Last Answer : multi-tenancy
Description : _________ applications have a much lower barrier to entry than their locally installed competitors. a) IaaS b) CaaS c) PaaS d) None of the mentioned
Last Answer : None of the mentioned
Description : Which of the following is a SaaS characteristic? a) The typical license is subscription-based or usage-based and is billed on a recurring basis b) The software is available over the Internet ... The software and the service are monitored and maintained by the vendor d) All of the mentioned
Description : Point out the wrong statement. a) SaaS applications come in all shapes and sizes b) Every computer user is familiar with SaaS systems c) SaaS software is not customizable d) None of the mentioned