What is true about FIDM?
A. FIDM describes the technologies and protocols
B. It uses Security Markup Language (SAML) to package a user's security credentials
C. SAML has access control
D. All of the above

1 Answer

Answer :

All of the above

Related questions

Description : Which of the following is authorization markup language? a) eXtensible Access Control Markup Language b) intrinsic Access Control Markup Language c) hypertext Access Control Markup Language d) all of the mentioned

Last Answer : eXtensible Access Control Markup Language

Description : The _______ Security Services Technical Committee is in charge of defining, enhancing, and maintaining the SAML specifications. a) OASIS b) HTTP c) SOAP d) OSAMIL

Last Answer : OASIS

Description : It offers users to login into multiple websites with single account. A. FIDM B. OpenID C. SSO D. Identity

Last Answer : OpenID

Description : _______ is an XML request/response language that is used to integrate and interoperate service provisioning requests. A. XACML B. FIDM C. SPML D. SSP

Last Answer : SPML

Description : Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii)monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii 

Description : Which of the following figure correctly describes products by CA technologies? a) b) c)d) None of the mentioned

Last Answer : b)

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : The most commonly used set of protocols uses ______ as the messaging format. a) XML b) JSON c) BSON d) All of the mentioned

Last Answer : XML

Description : Which statement is true about a cloud computing environment? A. It cannot be used to host location based applications. B. It enables users to access systems regardless of their location. C. It introduces ... D. It can improve a web server response time by having servers closer to the end user.

Last Answer : It enables users to access systems regardless of their location.

Description : Which statement is true about the security of the cloud computing environment? A. It is compromised because it is a shared environment. B. Multitenant applications are not able to run in a cloud ... a private cloud. D. Access to critical data is better controlled in a private cloud environment.

Last Answer : Access to critical data is better controlled in a private cloud environment

Description : What is true about PaaS? A. PaaS tool is a fully integrated development environment. B. PaaS systems support standards such as HTML, JavaScript, or other rich media technologies. C. PaaS offers the runtime environment for applications. D. All of the above

Last Answer : All of the above

Description : HTML is a markup language for describing web documents (web pages). Which among the following features is correct about HTML: a) HTML stands Hyper Text Markup Language b) A Markup language is a set ... tags d) Each HTML tag describes different document content e) None of These f) All of the Above

Last Answer : f) All of the Above

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : HTML is a markup language for describing Web document. HTML uses (a) pre_specified tags (b) user defined tags -Technology

Last Answer : (d) HTML uses fixed tags defined by the language.

Description : Point out the wrong statement. a) Securing data sent to, received from, and stored in the cloud is the single largest security concern b) The problem with the data you store in the cloud is that ... the cloud from direct client access is to create layered access to the data d) All of the mentioned

Last Answer : One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data

Description : Which is considered as an emerging industry best practice for dealing with dynamic and loosely coupled trust relationships in the collaboration model of an organization in Identity and Access management a) Identity federation b) Cloud federation c) Security federation d) None of the above

Last Answer : Identity federation

Description : Which of the following group is dedicated to support technologies that implement enterprise mashups? a) Open Alliance Apache b) Open Mashup Alliance c) Open Tech Alliance d) None of the mentioned

Last Answer : Open Mashup Alliance

Description : Which of the following are the major types of virtualization technologies? A. Type1 and Type3. B. Type1 and Type2. C. Type3 and Type4. D. Type2 and Type4.

Last Answer : Type1 and Type2.

Description : Which of the following group is dedicated to support technologies that implement enterprise mashups? A. Open Alliance Apache B. Open Mashup Alliance C. Open Tech Alliance D. None of the above

Last Answer : Open Mashup Alliance

Description : _____________ consists of servers, storage devices, network, cloud management software, deployment software, and platform virtualization. A. Computing Planning B. Cloud infrastructure C. Cloud Computing Technologies D. Cloud Computing Architecture

Last Answer : Cloud infrastructure

Description : Which of the following are correct technologies working behind the cloud computing platforms? A. Virtualization B. SOA C. Grid Computing D. All of the above

Last Answer : D. All of the above

Description : Which of the following are correct technologies working behind the cloud computing platforms? A. Virtualization B. SOA C. Grid Computing D. All of the above

Last Answer : All of the above

Description : What is Business Architecture Development? A. we recognize the risks that might be caused by cloud computing application from a business perspective. B. we identify the applications that support the ... are required to transform current business to cloud computing modes. D. None of the above

Last Answer : A. we recognize the risks that might be caused by cloud computing application from a business perspective.

Description : Point out the correct statement. a) A virtual machine is a computer that is walled off from the physical computer that the virtual machine is running on b) Virtual machines provide the ... that having resources indirectly addressed means there is some level of overhead d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following are correct technologies working behind the cloud computing platforms? a) Virtualization b) SOA c) Grid Computing d) All of the above

Last Answer : ) All of the above

Description : Point out the wrong statement. a) Atom is a syndication format that allows for HTTP protocols to create and update information b) Cloud services span the gamut of computer applications c) ... discourage the use of open-network protocols in place of proprietary protocols d) None of the mentioned

Last Answer : The impact of cloud computing on network communication is to discourage the use of open-network protocols in place of proprietary protocols

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Virtual appliances are becoming a very important standard cloud computing deployment object b) Cloud computing requires some standard protocols c) Cloud computing relies on a set of protocols needed to manage interprocess communications d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the correct statement. a) Cloud computing is a natural extension of many of the design principles, protocols, plumbing, and systems b) Platforms are used to create more easy software c) All SLAs are enforceable as contracts d) All of the mentioned

Last Answer : Cloud computing is a natural extension of many of the design principles, protocols, plumbing, and systems

Description : Point out the correct statement : A. Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service B. Cloud computing relies on a ... communications C. Platforms are used to create more complex software D. All of the mentioned

Last Answer : All of the mentioned

Description : How many types of protocols are important for instant messaging? a) 2 b) 3 c) 4 d) All of the mentioned

Last Answer : 3

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : What is Onion diagram illustrates? a) It illustrates the connection between the layers in communications protocols, such as the International Standards Organization Open Systems Interconnection (ISO OSI) model,or the ... with the kernel at the core c) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : In IPv6,a _______address is usedif aLAN uses the Internet protocols but isnot connected tothe Internet for security reasons. A) link local B) site local C) mapped D) none of the above

Last Answer : link local

Description : Users can control which keys (and hence records) go to which Reducer by implementing a custom? a) Partitioner b) OutputSplit c) Reporter d) All of the mentioned

Last Answer : Partitioner

Description : If I login to a third party site using my google account credentials, what can that third part access?

Last Answer : answer:If you actually gave them your Google password, they can read anything. If they gave you a pop-up window, which is actually a login to Google, with a note saying something like I will let ... only see your contacts. I think that might not be very clear. I wish I could illustrate it better.

Description : Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking. a. Local networking b. Social engineering c. Physical entry d. Remote networking

Last Answer : d. Remote networking

Description : Cloud providers provide cloud services to the cloud users. a) True b) False

Last Answer : True

Description : Which of the following are benefit of IaaS? A. Flexible and efficient renting of computer hardware. B. Portability, interoperability with legacy applications. C. Full control of the computing resources through administrative access to VMs. D. All of the above

Last Answer : All of the above

Description : Which of the following is a key mechanism for protecting data? a) Access control b) Auditing c) Authentication d) All of the mentioned

Last Answer : All of the mentioned

Description : What advantage is there for an enterprise to adopt a virtual private cloud model? A. Reduce costs by adopting a flexible pricing model for the entire operation. B. Reduce infrastructure ... such as security and performance since the entire infrastructure will be managed within the IT department.

Last Answer : Manage sensitive data in a compliant and secure manner and benefit from flexible pricing models for select services or infrastructure.

Description : Point out the correct statement. a) The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements b) To determine the particular ... you normally use for your applications only CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying

Description : The addition of a software package on top of a cloud storage volume makes most cloud storage offerings conform to a ________ as a Service model. a) Software b) Platform

Last Answer : ) Software

Description : The addition of a software package on top of a cloud storage volume makes most cloud storage offerings conform to a ________ as a Service model. a) Software b) Platform c) Analytics d) None of the mentioned

Last Answer : Software