Description : Point out the wrong statement. a) XML checks the ID request against its policies and either allows or denies the request b) SPML in most instances operates as a reply/request mechanism c) User centric authentication takes place usually in the form of knowledge cards d) All of the mentioned
Last Answer : SPML in most instances operates as a reply/request mechanism
Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned
Last Answer : The OpenID and
Description : Point out the correct statement. a) The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements b) To determine the particular ... you normally use for your applications only CSE-R17.BLOGSPOT.COM d) All of the mentioned
Last Answer : To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying
Description : To read a file in HDFS, a user sends an _______ request to the NameNode toget the location of file blocks. a) access b) open c) authentication d) create
Last Answer : open
Description : Which of the following area of cloud computing is uniquely troublesome? a) Auditing b) Data integrity c) e-Discovery for legal compliance d) All of the mentioned
Last Answer : All of the mentioned
Description : The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service. a) Higgins b) Hughes c) Hinges d) All of the mentioned
Last Answer : Higgins
Description : _________ is one of the more expensive and complex areas of network computing. a) Multi-Factor Authentication b) Fault tolerance c) Identity protection d) All of the mentioned
Last Answer : Identity protection
Description : __________ authentication requires the outside use of a network security or trust service. a) SSO b) Singlefactor c) Multi Factor d) All of the mentioned
Last Answer : Multi Factor
Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned
Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users
Description : Which of the following is one of the most actively developing and important areas of cloud computing technology? a) Logging b) Auditing c) Regulatory compliance d) None of the mentioned
Last Answer : Regulatory compliance
Description : Point out the wrong statement. A. Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems B. The Distributed Audit ... CardSpace specifications support the authentication type of data object D. All of the above
Last Answer : The OpenID and CardSpace specifications support the authentication type of data object
Description : Which of the following techniques can be used for optimizing backed up data space? a) Encryption and Deduplication b) Compression and Deduplication c) Authentication and Deduplication d) Deduplication only
Last Answer : Compression and Deduplication
Description : Which of the following is authorization markup language? a) eXtensible Access Control Markup Language b) intrinsic Access Control Markup Language c) hypertext Access Control Markup Language d) all of the mentioned
Last Answer : eXtensible Access Control Markup Language
Description : Point out the wrong statement. a) A MapReduce job usually splits the input data-set into independent chunks which are processed by the map tasks in a completely parallel manner b) The ... implement the Mapper and Reducer interfaces toprovide the map and reduce methods d) None of the mentioned
Last Answer : None of the mentioned
Description : Point out the wrong statement. a) Securing data sent to, received from, and stored in the cloud is the single largest security concern b) The problem with the data you store in the cloud is that ... the cloud from direct client access is to create layered access to the data d) All of the mentioned
Last Answer : One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data
Description : Which of the following component is required for both online and local data access in hybrid application? a) local b) cloud c) both local and cloud d) none of the mentioned
Last Answer : both local and cloud
Description : Point out the wrong statement. a) Each different type of cloud service delivery model creates a security boundary b) Any security mechanism below the security boundary must be built into the system ... mechanism above the security boundary must be maintained by the customer d) All of the mentioned
Description : Which two statements are true about the public cloud model? A. It meets security and auditing requirements for highly regulated industries. B. Resources and infrastructure are managed ... capital expenditures to creating a virtualized and elastic infrastructure within the enterprise data center.
Last Answer : It shifts the bulk of the costs from capital expenditures and IT infrastructure investment to an utility operating expense model.
Description : More secure authentication requires the use of at least? A. two-factor authentication. B. three-factor authentication. C. four-factor authentication. D. None of the above
Last Answer : two-factor authentication
Description : What is true about SSO? A. SSO has multiple authentication server B. SSO managing single accesses to other systems C. In SSO, User sends the ticket to intranet server. D. All of the above
Last Answer : In SSO, User sends the ticket to intranet server.
Description : _____ has single authentication server, managing multiple accesses to other systems A. SSO B. IDaaS C. SOAP D. SOA
Last Answer : SSO
Description : Which of the following is built on top of a Hadoop framework using the Elastic Compute Cloud? a) Amazon Elastic MapReduce b) Amazon Mechanical Turkc) Amazon DevPay d) Multi-Factor Authentication
Last Answer : Amazon Elastic MapReduce
Description : Which of the following is a means for accessing human researchers or consultants to help solve problems on a contractual or temporary basis? a) Amazon Elastic MapReduce b) Amazon Mechanical Turk c) Amazon DevPay d) Multi-Factor Authentication
Last Answer : Amazon Mechanical Turk
Description : Which of the following is a billing and account management service? a) Amazon Elastic MapReduce b) Amazon Mechanical Turk c) Amazon DevPay d) Multi-Factor Authentication
Last Answer : Amazon DevPay
Description : The original OpenID authentication protocol was developed in _________ by _________ a) May 2004, Charles b) May 2003, Brad Fiper c) May 2005, Brad Fitzpatrick d) May 2005, Charles Brad
Last Answer : May 2005, Brad Fitzpatrick
Description : The framework groups Reducer inputs by key in _________ stage. a) sort b) shuffle c) reduce d) none of the mentioned
Last Answer : sort
Description : Point out the wrong statement. a) The Mapper outputs are sorted and then partitioned per Reducer b) The total number of partitions is the same as the number of reduce tasks for the job c) The intermediate, ... always stored in a simple (key-len, key, value-len, value) format d) None of the mentioned
Description : Point out the correct statement. a) Mapper maps input key/value pairs to a set of intermediate key/value pairs b) Applications typically implement the Mapper and Reducer interfaces to provide the map and ... methods c) Mapper and Reducer interfaces form the core of the job d) None of the mentioned
Description : Which of the following is the standard for interoperable cloud-based key management? a) KMIP b) PMIK c) AIMK d) None of the mentioned
Last Answer : KMIP
Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned
Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned
Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable
Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned
Last Answer : REST stands for Representational State Transfer
Description : Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage? a) On-demand self-service b) Broad network access c) Resource pooling d) All of the mentioned
Last Answer : On-demand self-service
Description : _________ model consists of the particular types of services that you can access on a cloudcomputing platform. a) Service b) Deployment c) Application d) None of the mentioned
Last Answer : Service
Description : Which of the following is not provided by “Deep Web”? a) Database generated Web pages b) Private or limited access Web pages c) Pages without links d) All of the mentioned
Description : Which of the following provide system resource access to virtual machines? a) VMM b) VMC c) VNM d) All of the mentioned
Last Answer : VMM
Description : Which of the following disk operation is performed When a tenant is granted access to a virtual storage container? a) CRUD b) File system modifications c) Partitioning d) All of the mentioned
Description : Which of the following is considered an essential element in cloud computing by CSA? a) Multi-tenancy b) Identity and access management c) Virtualization d) All of the mentioned
Last Answer : Virtualization
Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned
Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications
Description : Which of the following factors might offset the cost of offline access in hybrid applications? a) scalability b) costs c) ubiquitous access d) all of the mentioned
Last Answer : all of the mentioned
Description : Point out the wrong statement. CSE-R17.BLOGSPOT.COM a) SOA provides the standards that transport the messages and makes the infrastructure to support it possible b) SOA provides access ... and widely shareable components that can minimize developer and infrastructure costs d) None of the mentioned
Last Answer : SOA provides access to reusable Web services over an SMTP network
Description : Which of the following benefit is related to create resources that are pooled together in a system that supports multi-tenant usage? a) On-demand self-service b) Broad network access c) Resource pooling d) All of the mentioned