Description : Exposing a stand-alone SOAP endpoint using the:- a) SimpleJaxWsServiceExporter b) JAX-WS c) All of the mentioned d) None of the mentioned
Last Answer : All of the mentioned
Description : Which of the following is commonly used to describe the service interface, how to bind information, and the nature of the component’s service or endpoint? a) WSDL b) SCDL c) XML d) None of the mentioned
Last Answer : WSDL
Description : Spring provides a factory that can export beans annotated with:- a) javax.jws.WebService b) javax.jws.WebServiceProvider c) all of the mentioned d) none of the mentioned
Last Answer : all of the mentioned
Description : Spring comes with a service exporter that CSE-R17.BLOGSPOT.COM can export a bean as a SOAP web service.
Last Answer : False
Description : If you are deploying into a Java EE 5 (or better) container, you may simply create a bean that is annotated with:- a) javax.jws.WebService b) javax.jws.WebServiceProvider c) all of the mentioned d) none of the mentioned
Description : Service exporters that can export a bean as a remote service based on the :- a) RMI b) Hessian c) Burlap d) All of the mentioned
Description : To publish a REST service with Spring. a) publishing an application’s data as a REST service b) accessing data from third-party REST services c) none of the mentioned d) all of the mentioned
Description : The Mapper implementation processes one CSE-R17.BLOGSPOT.COM line at a time via _________ method.a) map b) reduce c) mapper d) reducer
Last Answer : map
Description : 10. If you are using the JAX-RS Reference Implementation, this intermediary step will involve a tool called wsgen. a) True b) False
Last Answer : True
Description : An implementation of an SLA should specify, a) Purpose. b) Restrictions. c) Scope. d) All the above.
Last Answer : All the above.
Description : Which of the architectural layer is used as a front end in cloud computing? a) client b) cloud c) soft d) all of the mentioned
Last Answer : client
Description : .Which of the architectural layer is used as a front end in cloud computing? a) client b) cloud c) soft d) all of the mentioned
Description : What is Cloud Foundry? A. A factory that produces cloud components B. An industry wide PaaS initiative C. VMware-led open source PaaS.
Last Answer : VMware-led open source PaaS.
Description : What is Cloud Foundry? A. A factory that produces cloud components. B. VMware-led open source PaaS. C. An industry wide PaaS initiative. D. VMware-led closed source PaaS.
Description : if one end point is at (-5,-6) and the midpoint is at (1,1) whats the endpoint?
Last Answer : M = ((x1+x2)/2, (y1+y2)/2)(1,1) = ((-5+x)/2, (-6+y)/2)(-5+x))/2 = 1, (-6+y)/2 = 1-5 + x = 2, -6+y = 2x = 7, y = 8The end point is (7,8)
Description : A line segment has an endpoint at (3, 2). If the midpoint of the line segment is (6, -2), what are the coordinates of the point at the other end of the line segment?
Last Answer : (9,4)
Description : Accessing a third-party REST service inside a Spring application. a) RestTemplate Class b) ViewResolver c) InternalViewResolver d) View
Last Answer : RestTemplate Class
Description : Spring supports a series of mechanisms to generate a REST service payload. a) True b) False
Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned
Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable
Description : __________ authentication requires the outside use of a network security or trust service. a) SSO b) Singlefactor c) Multi Factor d) All of the mentioned
Last Answer : Multi Factor
Description : Point out the wrong statement. a) Atom is a syndication format that allows for HTTP protocols to create and update information b) Cloud services span the gamut of computer applications c) ... discourage the use of open-network protocols in place of proprietary protocols d) None of the mentioned
Last Answer : The impact of cloud computing on network communication is to discourage the use of open-network protocols in place of proprietary protocols
Description : Point out the correct statement. a) Virtual machines are containers that are assigned specific resources b) Applications need not be mindful of how they use cloud resources c) When a developer ... a cloud service, the developer cannot attach to the appropriate service d) All of the mentioned
Last Answer : Virtual machines are containers that are assigned specific resources
Description : _____ is a financial estimate for the costs of the use of a product or service over its lifetime. a) TCO b) TOC c) COT d) All of the mentioned
Last Answer : TCO
Description : The ________ cloud infrastructure is operated for the exclusive use of an organization. a) Public b) Private c) Community d) All of the mentioned
Last Answer : Private
Description : The __________ model originally did not require a cloud to use virtualization to pool resources. a) NEFT b) NIST c) NIT d) All of the mentioned
Last Answer : NIST
Description : Point out the wrong statement. a) All IM clients use peer-to-peer messaging b) IM software aimed at businesses such as XMPP, Lotus Sametime, and Microsoft Office Communicator use a client/server ... messaging is as popular in business as it is in personal communications d) None of the mentioned
Last Answer : None of the mentioned
Description : Applications can use the ____________ to report progress and set application-level status messages. a) Partitioner b) OutputSplit c) Reporter d) All of the mentioned
Last Answer : Reporter
Description : Which of the following use LUNs to define a storage volume that appears to a connected computer as a device? a) SAN b) iSCSI c) Fibre Channel CSE-R17.BLOGSPOT.COM d) All of the mentioned
Description : Point out the correct statement. a) The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements b) To determine the particular ... you normally use for your applications only CSE-R17.BLOGSPOT.COM d) All of the mentioned
Last Answer : To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying
Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned
Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications
Description : Point out the wrong statement. a) Cloudkick's Insight module is powerful and particularly easy to use CSE-R17.BLOGSPOT.COM b) Both Cloudkick and RightScale are knownto be easy to use with ... with Linux instances c) All of the service models support monitoring solutions d) All of the mentioned
Last Answer : Both Cloudkick and RightScale are known
Description : Point out the correct statement. a) Eucalyptus and Rackspace both use Amazon EC2 and S3 services b) The RightScale user interface provides real-time measurements of individual server instances c) ... technology are highly configurable and can be run under batch control d) All of the mentioned
Description : Point out the correct statement. a) Virtual machines are containers that are assigned specific resources b) Applications need not be mindful of how they use cloud resources c) When a developer ... uses a cloud service, the developercannot attach to the appropriate service d) All of the mentioned
Description : In particular, layers have which of the following characteristics? a) Layers are by definition highly cohesive, thus satisfying the Principle of Cohesion b) Layers doesn’t support information hiding c) Layers are constrained to use only above layers d) All of the mentioned
Last Answer : Layers are by definition highly cohesive, thus satisfying the Principle of Cohesion
Description : What is Relaxed Layered Style? a) Each layer can be constrained to use only the layer directly below it b) Sometimes this constraint is relaxed slightly to allow each layer to use all the layers below it c) All of the mentioned d) None of the mentioned
Last Answer : Sometimes this constraint is relaxed slightly to allow each layer to use all the layers below it
Description : Which of the following is incorrect? a) A Layered-style program is divided into an array of modules or layers b) Each layer provides services to the layer “below” and makes use of services provided by the layer “above” c) All of the mentioned d) None of the mentioned
Last Answer : Each layer provides services to the layer “below” and makes use of services provided by the layer “above”
Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned
Description : Point out the wrong statement. a) Unmanaged storage is reliable b) Managed storage is relatively cheap to use c) Most of the user-based applications that work with cloud storage are of unmanaged type d) None of the mentioned
Last Answer : Managed storage is relatively cheap to use
Description : Which model originally did not require a cloud to use virtualization to pool resources a) NEFT b) NIST c) NIT d) All of the mentioned
Description : Email is _________ A. Loss-tolerant application B. Bandwidth-sensitive application C. Elastic application D. None of the mentioned
Last Answer : C. Elastic application
Description : Which of the following network resources can be load balanced? a) Connections through intelligent switches b) DNS c) Storage resources d) All of the mentioned
Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned
Description : The technology used to distribute service requests to resources is referred to as _____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned
Last Answer : load balancing
Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned
Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned
Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users
Description : Which of the following correctly represents different types of mobile patterns? a) b) c) d) All of the mentioned
Last Answer : a)