Which of the following is the standard for
interoperable cloud-based key management?
a) KMIP
b) PMIK
c) AIMK
d) None of the mentioned

1 Answer

Answer :

KMIP

Related questions

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Virtual appliances are becoming a very important standard cloud computing deployment object b) Cloud computing requires some standard protocols c) Cloud computing relies on a set of protocols needed to manage interprocess communications d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the following standard connect distributed hosts or tenants to their provisioned storage in the cloud? a) CDMI b) OCMI c) COA d) All of the mentioned

Last Answer : CDMI

Description : Which of the following standard connect distributed hosts or tenants to their provisioned storage in the cloud? a) CDMI b) OCMI c) COA d) All of the mentioned

Last Answer : CDMI

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : Cloud computing is also a good option when the cost of infrastructure and management is ______ a) low b) high c) moderate d) none of the mentioned

Last Answer : high

Description : Point out the correct statement. a) Except for tightly managed SaaS cloud providers, the burden of resource management is still in the hands of the user b) Cloud computing vendors run very reliable ... barrier to entry cannot be accompanied by a low barrier to provisioning d) All of the mentioned

Last Answer : Cloud computing vendors run very reliable networks

Description : Point out the wrong statement. a) Google App Engine allows a developer to scale an application immediately b) The customer relationship management provider SalesForce.com has a development platform called Force. ... become a hub master at the center of many ISVs offerings d) None of the mentioned

Last Answer : The customer relationship management provider SalesForce.com has a development platform called Force.com that is an IaaS offering

Description : Which of the following is considered an essential element in cloud computing by CSA? a) Multi-tenancy b) Identity and access management c) Virtualization d) All of the mentioned

Last Answer : Virtualization

Description : Which of the following is a core management feature offered by most cloud management service products? a) Support of different cloud types b) Creation and provisioning of different types of cloud ... and uptime, response time, resource quota usage, and other characteristics d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Google App Engine lets you deploy the application and monitor it b) From the standpoint of the client, a cloud service provider is different than any other networked ... be brought to bear to solve mobile, desktop, and local server issues d) All of the mentioned

Last Answer : From the standpoint of the client, a cloud service provider is different than any other networked service

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service. a) Higgins b) Hughes c) Hinges d) All of the mentioned

Last Answer : Higgins

Description : Point out the correct statement. a) Platforms can be based on specific types of development languages, application frameworks, or other constructs b) SaaS is the cloud-based equivalent of shrink- ... succinctly described as software that is deployed on a hosted service d) All of the mentioned

Last Answer : All of the mentioned

Description : ________ captive requires that the cloud accommodate multiple compliance regimes. a) Licensed b) Policy-based c) Variable d) All of the mentioned

Last Answer : Policy-based

Description : _______ model attempts to categorize a cloud network based on four dimensional factors. a) Cloud Square b) Cloud Service c) Cloud Cube d) All of the mentioned

Last Answer : Cloud Cube

Description : Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a ________ resource. a) real b) virtual c) cloud d) none of the mentioned

Last Answer : virtual

Description : Point out the wrong statement. a) Wolf Frameworks uses a C# engine and supports both Microsoft SQL Server and MySQL database b) Applications built in Wolf are 50-percent browser-based ... and multisource overlaid content c) Google applications are cloud-based applications d) None of the mentioned

Last Answer : Applications built in Wolf are 50-percent browser-based and support mashable and multisource overlaid content

Description : Which of the following feature make cloud-based storage systems highly reliable? a) Redundant networks b) Redundant name servers c) Replication d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Platforms can be based on specific types of development languages, application frameworks, or other constructs b) SaaS is the cloud-based equivalent of shrink- ... succinctly described as software that is deployed on a hosted service d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons? a) CloudWatch b) CloudSensor c) CloudMetrics CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : CloudSensor

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Unmanaged storage is reliable b) Managed storage is relatively cheap to use c) Most of the user-based applications that work with cloud storage are of unmanaged type d) None of the mentioned

Last Answer : Managed storage is relatively cheap to use

Description : Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a ________ resource. a) real b) virtual c) cloud d) none of the mentioned

Last Answer : virtual

Description : .Which of the following feature make cloud-based storage systems highly reliable? a) Redundant networks b) Redundant name servers c) Replication d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Wolf Frameworks uses a C# engine and supports both Microsoft SQL Server and MySQL database b) Applications built in Wolf are 50-percent browser-based ... and multisource overlaid content c) Google applications are cloud-based applications d) None of the mentioned

Last Answer : Applications built in Wolf are 50-percent browser-based and support mashable and multisource overlaid content

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : Following statements are talking about . 1. It's more complex than a hybrid cloud, which is typically a paired private and public cloud. 2. This cloud add more clouds to the mix, perhaps two ... , private use-based accounting A. Multi-Cloud B. Private Cloud C. Business Cloud D. Storage Cloud

Last Answer : Multi-Cloud

Description : Point out the correct statement. a) With PaaS, the goal is to create hosted scalable applications that are used in a Software as a Service model b) Applications built using PaaS tools need to ... , the data and transaction management conforms to the business rules you create d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) With PaaS, the goal is to create hosted scalable applications that are used in a Software as a Service model b) Applications built using PaaS tools need to ... the data and transaction management conforms to the business rules you create d) All of the mentioned

Last Answer : All of the mentioned

Description : One of the key objectives for Security initiatives in the cloud should be subject to measurements that gauge effectiveness in mitigating risk to the enterprise a) Effective Use of Resources b) Sustained Performance c) Risk Mitigation d) Strategic Alignment

Last Answer : Risk Mitigation

Description : “Enterprises should mandate that security investments, services, and projects in the cloud are executed to achieve established business goals” is a key objective of _____________ a) Strategic Alignment b) Value Delivery c) Risk Mitigation d) Sustained Performance

Last Answer : Strategic Alignment

Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned

Last Answer : A Compliance as a Service application would need to serve as a trusted third party

Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned

Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable

Description : Which of the following is an example of a vertical cloud that advertise CaaS capabilities? a) FedCloud b) ClearPoint PCI c) Rackserve PCI d) All of the mentioned

Last Answer : All of the mentioned

Description : Rackspace Cloud Service is an example of _____________ a) IaaS b) SaaS c) PaaS d) All of the mentioned

Last Answer : IaaS

Description : _________ is designed specifically to run connected to the cloud as a dedicated cloud client. a) Harvera Tablet OS b) Fedora Netbook OS c) Jolicloud Netbook OS d) None of the mentioned

Last Answer : Jolicloud Netbook OS

Description : Point out the wrong statement. a) Atom is a syndication format that allows for HTTP protocols to create and update information b) Cloud services span the gamut of computer applications c) ... discourage the use of open-network protocols in place of proprietary protocols d) None of the mentioned

Last Answer : The impact of cloud computing on network communication is to discourage the use of open-network protocols in place of proprietary protocols

Description : Point out the wrong statement. a) Platforms represent nearly the full cloud software stack b) A platform in the cloud is a software layer that is used to create higher levels of servicec) ... replete with tools and utilities to aid in application design and deployment d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the correct statement. a) Virtual machines are containers that are assigned specific resources b) Applications need not be mindful of how they use cloud resources c) When a developer ... a cloud service, the developer cannot attach to the appropriate service d) All of the mentioned

Last Answer : Virtual machines are containers that are assigned specific resources

Description : Which of the architectural layer is used as a front end in cloud computing? a) client b) cloud c) soft d) all of the mentioned

Last Answer : client

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned