What is true about SSO?
A. SSO has multiple authentication server
B. SSO managing single accesses to other systems
C. In SSO, User sends the ticket to intranet server.
D. All of the above

1 Answer

Answer :

In SSO, User sends the ticket to intranet server.

Related questions

Description : _____ has single authentication server, managing multiple accesses to other systems A. SSO B. IDaaS C. SOAP D. SOA

Last Answer : SSO

Description : __________ authentication requires the outside use of a network security or trust service. a) SSO b) Singlefactor c) Multi Factor d) All of the mentioned

Last Answer : Multi Factor

Description : To read a file in HDFS, a user sends an _______ request to the NameNode toget the location of file blocks. a) access b) open c) authentication d) create

Last Answer : open

Description : It offers users to login into multiple websites with single account. A. FIDM B. OpenID C. SSO D. Identity

Last Answer : OpenID

Description : Which statement is true about a cloud computing environment? A. It cannot be used to host location based applications. B. It enables users to access systems regardless of their location. C. It introduces ... D. It can improve a web server response time by having servers closer to the end user.

Last Answer : It enables users to access systems regardless of their location.

Description : Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii)monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iiiĀ 

Description : A firewall is a a. wall built to prevent fires from damaging a corporate intranet b. security device deployed at the boundary of a company to prevent unauthorized physical access c. ... it from unauthorized access d. device to prevent all accesses from the internet to the corporate intranet

Last Answer : c. security device deployed at the boundary of a corporate intranet to protect it from unauthorized access

Description : Point out the wrong statement. a) XML checks the ID request against its policies and either allows or denies the request b) SPML in most instances operates as a reply/request mechanism c) User centric authentication takes place usually in the form of knowledge cards d) All of the mentioned

Last Answer : SPML in most instances operates as a reply/request mechanism

Description : The reasons leading to popularity of client-server systems are: A) More powerful workstations on LANs B) Needed for graphical user interfaces of end users. C) Remove computing load for presentation services from the system managing a shared database resource. D) All

Last Answer : D) All

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : Point out the wrong statement. A. Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems B. The Distributed Audit ... CardSpace specifications support the authentication type of data object D. All of the above

Last Answer : The OpenID and CardSpace specifications support the authentication type of data object

Description : Which statement best describes the relationship between application, server, and client in a multitenancy environment? A. Single instance of software running on a server and serves one client. B ... clients. D. Multiple instances of software running on multiple servers and serves one client.

Last Answer : Single instance of software running on a server and serves multiple clients.

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : VLANs and IP addresses resources are made available to end user via? A. Server virtualization. B. Client virtualization. C. End-user virtualization. D. IaaS

Last Answer : Server virtualization

Description : Who provide GUI (Graphical User Interface) to interact with the cloud? A. Client B. Application C. Client Infrastructure D. Server

Last Answer : Client Infrastructure

Description : Point out the correct statement. a) Eucalyptus and Rackspace both use Amazon EC2 and S3 services b) The RightScale user interface provides real-time measurements of individual server instances c) ... technology are highly configurable and can be run under batch control d) All of the mentioned

Last Answer : All of the mentioned

Description : It helps a user to have remote access to an application from a server. a) Application virtualization b) Network virtualization c) Desktop virtualization d) Storage virtualization

Last Answer : Application virtualization

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Which of the following can be identified as cloud? a) Web Applicationsb) Intranet c) Hadoop d) All of the mentioned

Last Answer : Hadoop

Description : IDaaS stands for? A. ID-as-a-Service B. Identity-as-a-Service C. Intranet-as-a-service D. Interoperability-as-a-Service

Last Answer : Identity-as-a-Service

Description : Which of the following can be identified as cloud? a) Web Applications b) Intranet c) Hadoop d) All of the mentioned

Last Answer : Hadoop

Description : Point out the correct statement. a) Platforms cannot be based on specific types of development languages, application frameworks, or other constructs b) PaaS systems offer a way to create user ... customers may interact with the software to enter and retrieve data d) All of the mentioned

Last Answer : PaaS systems offer a way to create user interfaces

Description : __________ allows multiple operating system instances to run as guest on the same server. A. Server. B. Hypervisor. C. Network. D. Data.

Last Answer : Hypervisor.

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service. a) Higgins b) Hughes c) Hinges d) All of the mentioned

Last Answer : Higgins

Description : _________ is one of the more expensive and complex areas of network computing. a) Multi-Factor Authentication b) Fault tolerance c) Identity protection d) All of the mentioned

Last Answer : Identity protection

Description : More secure authentication requires the use of at least? A. two-factor authentication. B. three-factor authentication. C. four-factor authentication. D. None of the above

Last Answer : two-factor authentication

Description : Which of the following is a key mechanism for protecting data? a) Access control b) Auditing c) Authentication d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is built on top of a Hadoop framework using the Elastic Compute Cloud? a) Amazon Elastic MapReduce b) Amazon Mechanical Turkc) Amazon DevPay d) Multi-Factor Authentication

Last Answer : Amazon Elastic MapReduce

Description : Which of the following is a means for accessing human researchers or consultants to help solve problems on a contractual or temporary basis? a) Amazon Elastic MapReduce b) Amazon Mechanical Turk c) Amazon DevPay d) Multi-Factor Authentication

Last Answer : Amazon Mechanical Turk

Description : Which of the following is a billing and account management service? a) Amazon Elastic MapReduce b) Amazon Mechanical Turk c) Amazon DevPay d) Multi-Factor Authentication

Last Answer : Amazon DevPay

Description : Which of the following techniques can be used for optimizing backed up data space? a) Encryption and Deduplication b) Compression and Deduplication c) Authentication and Deduplication d) Deduplication only

Last Answer : Compression and Deduplication

Description : The original OpenID authentication protocol was developed in _________ by _________ a) May 2004, Charles b) May 2003, Brad Fiper c) May 2005, Brad Fitzpatrick d) May 2005, Charles Brad

Last Answer : May 2005, Brad Fitzpatrick

Description : Which of the following techniques can be used for optimizing backed up data space? a) Encryption and Deduplication b) Compression and Deduplication c) Authentication and Deduplication d) Deduplication only

Last Answer : Compression and Deduplication

Description : How do I copy all my settings and most program accesses from an admin account to a power-user account?

Last Answer : answer:I haven't tried this exact scenario, but my first idea would be the Files and Settings Transfer Wizard. Being new to the task, I would highly recommend giving it a try. At the worst, ... How to use the Files and Settings Transfer Wizard in Windows XP http://support.microsoft.com/kb/293118

Description : Point out the wrong statement. a) SaaS applications come in all shapes and sizes b) Every computer user is familiar with SaaS systems c) SaaS software is not customizable d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the wrong statement. a) SaaS applications come in all shapes and sizes b) Every computer user is familiar with SaaS systems c) SaaS software is not customizable d) None of the mentioned

Last Answer : None of the mentioned

Description : What is Onion diagram illustrates? a) It illustrates the connection between the layers in communications protocols, such as the International Standards Organization Open Systems Interconnection (ISO OSI) model,or the ... with the kernel at the core c) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the wrong statement. a) SaaS applications come in all shapes and sizes b) Every computer user is familiar with SaaS systems c) SaaS software is not customizable d) None of the mentioned

Last Answer : None of the mentioned

Description : An enterprise needs highly controlled storage and access to their databases as well as managing the infrastructure for web front ends and other applications. They have a large existing IT infrastructure and they ... to reduce cost? A. public cloud B. hybrid cloud C. private cloud D. internal cloud

Last Answer : hybrid cloud

Description : Point out the wrong statement. a) Load balancing virtualizes systems and resources by mapping a logical address to a physical address b) Multiple instances of various Google applications are running on different hosts c) Google uses hardware virtualization d) All of the mentioned

Last Answer : Google uses hardware virtualization

Description : Point out the wrong statement. a) Load balancing virtualizes systems and resources by mapping a logical address to a physical address b) Multiple instances of various Google applications are running on different hosts c) Google uses hardware virtualization d) All of the mentioned

Last Answer : Google uses hardware virtualization

Description : Which of the following google product sends you periodic email alerts based on your search term? a) Alerts b) Blogger c) Calendar d) All of the mentioned

Last Answer : Alerts

Description : The method of synchronising the processor with the I/O device in which the device sends a signal when it is ready is? a) Exceptions b) Signal handling c) Interrupts d) DMA

Last Answer : Interrupts

Description : Which of the following google product sends you periodic email alerts based on your search term? a) Alerts b) Blogger c) Calendar d) All of the mentioned

Last Answer : Alerts

Description : What are two important benefits of using cloud computing? A. Deployment of single tenant application. B. Enhanced Web V2.0 interfaces for user interactions. C. Lower total cost of ownership and improved asset utilization. D. Provides better availability than a standard computing environment.

Last Answer : Lower total cost of ownership and improved asset utilization.

Description : What is most commonly used for managing the resources for every virtual system? a) Load balancer b) Hypervisor c) Router d) Cloud

Last Answer : Hypervisor

Description : What is most commonly used for managing the resources for every virtual system? a) Load balancer b) Hypervisor c) Router d) Cloud

Last Answer : Hypervisor