Description : Spring comes with a service exporter that CSE-R17.BLOGSPOT.COM can export a bean as a SOAP web service.
Last Answer : False
Description : The small scale unit wishing to export has to obtain exporters code number from _________. A. The Reserve Bank of India. B. The Central Bank of India. C. Any Regional Bank. D. Any International Bank.
Last Answer : A. The Reserve Bank of India.
Description : ________________ is a paradigm of distributed computing to provide the customers on-demand, utility based computing service. a) Remote Sensing b) Remote Invocation c) Cloud Computing d) Private Computing
Last Answer : Cloud Computing
Description : Factory to use our Spring bean as the implementation:- a) jaxws:end b) jaxws:endpoint c) all of the mentioned d) none of the mentioned
Last Answer : jaxws:endpoint
Description : If you are deploying into a Java EE 5 (or better) container, you may simply create a bean that is annotated with:- a) javax.jws.WebService b) javax.jws.WebServiceProvider c) all of the mentioned d) none of the mentioned
Last Answer : all of the mentioned
Description : Spring provides a factory that can export beans annotated with:- a) javax.jws.WebService b) javax.jws.WebServiceProvider c) all of the mentioned d) none of the mentioned
Description : Which of the following metrics are used to support Elastic Load Balancing? a) CloudWatch b) Amazon Elastic Block Store c) AWS Import/Export d) All of the mentioned
Last Answer : CloudWatch
Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned
Last Answer : REST stands for Representational State Transfer
Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned
Last Answer : All of the mentioned
Description : The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service. a) Higgins b) Hughes c) Hinges d) All of the mentioned
Last Answer : Higgins
Description : Which of the following is a SaaS characteristic? a) The typical license is subscription-based or usage-based and is billed on a recurring basis b) The software is available over the Internet ... The software and the service are monitored and maintained by the vendor d) All of the mentioned
Description : Point out the correct statement. a) Platforms can be based on specific types of development languages, application frameworks, or other constructs b) SaaS is the cloud-based equivalent of shrink- ... succinctly described as software that is deployed on a hosted service d) All of the mentioned
Description : _______ model attempts to categorize a cloud network based on four dimensional factors. a) Cloud Square b) Cloud Service c) Cloud Cube d) All of the mentioned
Last Answer : Cloud Cube
Description : Point out the correct statement. a) With PaaS, the goal is to create hosted scalable applications that are used in a Software as a Service model b) Applications built using PaaS tools need to ... , the data and transaction management conforms to the business rules you create d) All of the mentioned
Description : Which of the following is a SaaS characteristic? a) The typical license is subscription-based or usage-based and is billed on a recurring basis b) The software is available over the Internet globally ... The software and the service are monitored and maintained by the vendor d) All of the mentioned
Description : Point out the correct statement. a) With PaaS, the goal is to create hosted scalable applications that are used in a Software as a Service model b) Applications built using PaaS tools need to ... the data and transaction management conforms to the business rules you create d) All of the mentioned
Description : How can I use the burlap sacks I get from my local coffee shop for composting?
Last Answer : You can ship internationally using USPS priority mail, FedEx or UPS. You can acquire more information if you go directly to the post office. Or going to a UPS or FedEx shipping location/store.
Description : Point out the correct statement. a) Platforms cannot be based on specific types of development languages, application frameworks, or other constructs b) PaaS systems offer a way to create user ... customers may interact with the software to enter and retrieve data d) All of the mentioned
Last Answer : PaaS systems offer a way to create user interfaces
Description : Which of the following is based on the IETF Session Initiation Protocol? a) WSDL b) SIMPLE c) SOAP d) All of the mentioned
Last Answer : SIMPLE
Description : Which of the following offers virtual appliances, including ones based on Windows, all of which run on VMware Player? a) Bagvapp b) Jcinacio c) HelpdeskLive d) All of the mentioned
Last Answer : Bagvapp
Description : When you purchase shrink-wrapped software, you are using that software based on a licensing agreement called ________ a) EULA b) EUL c) ELA d) All of the mentioned
Last Answer : EULA
Description : ________ captive requires that the cloud accommodate multiple compliance regimes. a) Licensed b) Policy-based c) Variable d) All of the mentioned
Last Answer : Policy-based
Description : Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a ________ resource. a) real b) virtual c) cloud d) none of the mentioned
Last Answer : virtual
Description : Which of the following google product sends you periodic email alerts based on your search term? a) Alerts b) Blogger c) Calendar d) All of the mentioned
Last Answer : Alerts
Description : Point out the wrong statement. a) Wolf Frameworks uses a C# engine and supports both Microsoft SQL Server and MySQL database b) Applications built in Wolf are 50-percent browser-based ... and multisource overlaid content c) Google applications are cloud-based applications d) None of the mentioned
Last Answer : Applications built in Wolf are 50-percent browser-based and support mashable and multisource overlaid content
Description : Which of the following feature make cloud-based storage systems highly reliable? a) Redundant networks b) Redundant name servers c) Replication d) All of the mentioned
Description : Which of the following is the standard for interoperable cloud-based key management? a) KMIP b) PMIK c) AIMK d) None of the mentioned
Last Answer : KMIP
Description : Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons? a) CloudWatch b) CloudSensor c) CloudMetrics CSE-R17.BLOGSPOT.COM d) All of the mentioned
Last Answer : CloudSensor
Description : Which of the following describes a message-passing taxonomy for a component- based architecture that provides services to clients upon demand? a) SOA b) EBS c) GEC d) All of the mentioned
Last Answer : SOA
Description : Point out the wrong statement. a) Unmanaged storage is reliable b) Managed storage is relatively cheap to use c) Most of the user-based applications that work with cloud storage are of unmanaged type d) None of the mentioned
Last Answer : Managed storage is relatively cheap to use
Description : .Which of the following feature make cloud-based storage systems highly reliable? a) Redundant networks b) Redundant name servers c) Replication d) All of the mentioned
Description : The technology used to distribute service requests to resources is referred to as _____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned
Last Answer : load balancing
Description : Which of the following is a PCI CaaS service? a) FedCloud b) ClearSoln c) Rackserve PCI d) All of the mentioned
Last Answer : ) Rackserve PCI
Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned
Last Answer : A Compliance as a Service application would need to serve as a trusted third party
Description : Which of the following is a man-in-the-middle type of service? a) CaaS b) IaaS c) AaaS d) All of the mentioned
Last Answer : CaaS
Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned
Last Answer : The OpenID and
Description : Which of the following is provided by Identity as a Service? a) Identity governance b) Provisioning c) Risk and event monitoring d) All of the mentioned
Description : __________ authentication requires the outside use of a network security or trust service. a) SSO b) Singlefactor c) Multi Factor d) All of the mentioned
Last Answer : Multi Factor
Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned
Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses