_______ is an XML request/response language that is used to integrate and interoperate
service provisioning requests.
A. XACML
B. FIDM
C. SPML
D. SSP

1 Answer

Answer :

SPML

Related questions

Description : Point out the wrong statement. a) XML checks the ID request against its policies and either allows or denies the request b) SPML in most instances operates as a reply/request mechanism c) User centric authentication takes place usually in the form of knowledge cards d) All of the mentioned

Last Answer : SPML in most instances operates as a reply/request mechanism

Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned

Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable

Description : Which of the following allows a distributed ID system to write and enforce custom policy expressions? a) XACML b) XML c) SOAP d) None of the mentioned

Last Answer : XACML

Description : Which of the following allows a distributed ID system to write and enforce custom policy expressions? a) XACML b) XML c) SOAP d) None of the mentioned

Last Answer : XACML

Description : Which of the following is a core management feature offered by most cloud management service products? a) Support of different cloud types b) Creation and provisioning of different types of cloud ... and uptime, response time, resource quota usage, and other characteristics d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : What is true about FIDM? A. FIDM describes the technologies and protocols B. It uses Security Markup Language (SAML) to package a user's security credentials C. SAML has access control D. All of the above

Last Answer : All of the above

Description : XML tag which represents information related to a REST service request. a) Result b) Title c) None of the mentioned CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : All of the mentioned

Description : .The __________ addresses the technical challenges involved in enabling heterogeneous cloud computing systems to interoperate seamlessly a) Logical and Operational Level b) Infrastructure Level c) None of the above d) Conceptual Level

Last Answer : Infrastructure Level

Description : Which of the following is provided by Identity as a Service? a) Identity governance b) Provisioning c) Risk and event monitoring d) All of the mentioned

Last Answer : All of the mentioned

Description : .Interconnecting the cloud computing environments of two or more service providers is called as a) Cloud Federation b) Intra Cloud c) Cloud Provisioning d) Cloud Connecting

Last Answer : Conceptual Level

Description : A Solution to overcome the challenge to support a large number of application service consumers from around the world, cloud infrastructure providers (i.e., IaaS providers) have established data ... ) Global exchange of cloud resources b) Resource provisioning c) Cloud security d) Resource sharing

Last Answer : Global exchange of cloud resources

Description : The _________ Open Source Identity Framework uses an i-Card metaphor. A. Hughes B. Higgins C. Hinges D. XACML

Last Answer : Higgins

Description : It offers users to login into multiple websites with single account. A. FIDM B. OpenID C. SSO D. Identity

Last Answer : OpenID

Description : Point out the correct statement. a) Except for tightly managed SaaS cloud providers, the burden of resource management is still in the hands of the user b) Cloud computing vendors run very reliable ... barrier to entry cannot be accompanied by a low barrier to provisioning d) All of the mentioned

Last Answer : Cloud computing vendors run very reliable networks

Description : Which of the following statement is true about virtualization technology? A. Allows manual provisioning of environments. B. Administrationsoftware constantly monitors the software. C. Save energy by powering off the servers. D. Allows automatic deployment of applications.

Last Answer : Allows automatic deployment of applications.

Description : .In an enterprise-level model of technology by which a customer can purchase cloud services as and when needed is called as a) On-Demand Computing b) Resource Provisioning c) Over Provisioning d) Under Provisioning

Last Answer : On-Demand Computing

Description : If an enterprise has too many resources and they will be paying for assets they aren’t using is termed as a) Under provisioning b) Elasticity c) Over provisioning d) None of the above

Last Answer : Over provisioning

Description : The technology used to distribute service requests to resources is referred to as _____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned

Last Answer : load balancing

Description : The technology used to distribute service requests to resources is referred to as_____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned

Last Answer : load balancing

Description : The technology used to distribute service CSE-R17.BLOGSPOT.COM requests to resources is referred to as_____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned

Last Answer : load balancing

Description : The technology used to distribute service requests to resources is referred to as _____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned

Last Answer : load balancing

Description : Point out the wrong statement. a) Taken as a unit, Request => Process => Response is not an atomic transaction b) A coherent transaction either succeeds and is enacted, or ... transaction commitment in a multiuser application, durability requires correcting the condition d) None of the mentioned

Last Answer : Taken as a unit, “Request => Process => Response” is not an atomic transaction

Description : To read a file in HDFS, a user sends an _______ request to the NameNode toget the location of file blocks. a) access b) open c) authentication d) create

Last Answer : open

Description : Management Software is used for? A. It helps to maintain and configure the infrastructure. B. It helps to deploy and integrate the application on the cloud. C. Both A and B D. None of the above

Last Answer : It helps to maintain and configure the infrastructure.

Description : In contrast, the contract-first approach encourages you to think of the service contract first in terms of :- a) XML b) XML Schema(.xsd) c) WSDL d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is commonly used to describe the service interface, how to bind information, and the nature of the component’s service or endpoint? a) WSDL b) SCDL c) XML d) None of the mentioned

Last Answer : WSDL

Description : Which of the following is used to define the service component that performs the service? a) WSDL b) SCDL c) XML d) None of the mentioned

Last Answer : SCDL

Description : Which of the following is commonly used to describe the service interface, how to bind information, and the nature of the component’s service or endpoint? a) WSDL b) SCDL c) XML d) None of the mentioned

Last Answer : WSDL

Description : Which of the following is used to define the service component that performs the service? a) WSDL b) SCDL c) XML d) None of the mentioned

Last Answer : SCDL

Description : Service books and service rolls in _______ the ________ is responsible for the safe custody a) Divisional office, SP b) Divisional office , SSP c) Head Offices, Head Post master d) None of these

Last Answer : c) Head Offices, Head Post master

Description : The Register that stores all interrupt requests is: (A) Interrupt mask register (B) Interrupt service register (C) Interrupt request register (D) Status register

Last Answer : (C) Interrupt request register

Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned

Last Answer : REST stands for Representational State Transfer

Description : The most commonly used set of protocols uses ______ as the messaging format. a) XML b) JSON c) BSON d) All of the mentioned

Last Answer : XML

Description : To send objects across the wire, beans need to be encoded using the Java Architecture for XML Binding (JAXB). a) True b) False

Last Answer : True

Description : In some cases, it’s also hard to map an object to XML (e.g., an object graph with cyclic references) because there’s actually an impedance mismatch between an object model and an XML model. a) True b) False

Last Answer : True

Description : In the case of classesToBeBound, the classes assigned to this property, indicate the class (i.e., object) structure that is to be transformed into XML. a) True b) False

Last Answer : True

Description : The marshaller used by MarshallingView belongs to one of a series of XML marshallers. a) Jaxb2Marshaller b) XmlBeansMarshaller c) CastorMarshalle d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is used as middleware layer in the following figure? a) XML b) ESB c) UDDI d) None of the mentioned

Last Answer : ESB

Description : Which of the following provides commands for defining logic using conditional statements?a) XML b) WS-BPEL c) JSON d) None of the mentioned

Last Answer : WS-BPEL

Description : Which of the following protocol lets a Web site list in an XML file information? a) Sitemaps b) Mashups c) Hashups d) All of the mentioned

Last Answer : Sitemaps

Description : Which of the following is used as middleware layer in the following figure? a) XML b) ESB c) UDDI d) None of the mentioned

Last Answer : ESB

Description : Which of the following provides commands for defining logic using conditional statements? a) XML b) WS-BPEL c) JSON d) None of the mentioned

Last Answer : WS-BPEL

Description : What is the difference between request and requests?

Last Answer : The difference is when you demand for something you're notasking for it you're telling them for it. When you request forsomething, you are simple just asking for it.

Description : Which of the following is/are the sources for project requests? A) Request from Department managers B) Request from senior executives C) Request from system Analyst D) All of the above

Last Answer : D) All of the above

Description : A disk drive has 100 cylinders, numbered 0 to 99. Disk requests come to the disk driver for cyclinders 12, 26, 24, 4, 42, 8 and 50 in that order. The driver is currently serving a request at cyclinder 24. A seek takes ... (SSTF) algorithm? (A) 0.984 sec (B) 0.396 sec (C) 0.738 sec (D) 0.42 sec

Last Answer : C

Description : CART stands for _______ a. Computer Analysis and Request Time b. Computer Analysis and Response Time c. Crime Analysis and Response Time

Last Answer : b. Computer Analysis and Response Time