Point out the correct statement.
 a) WS-+ services carried over XML messages using the SOAP
protocol access remote server applications
 b) REST stands for Representational State Transfer
 c) A
transaction following the rules of SOAP is considered to be RESTful
 d) All of the mentioned

1 Answer

Answer :

REST stands for Representational State Transfer

Related questions

Description : Communication between services is done widely using _______ protocol. a) REST b) SOAP c) RESTful d) None of the mentioned

Last Answer : SOAP

Description : Communication between services is done widely using _______ protocol. a) REST b) SOAP c) RESTful d) None of the mentioned

Last Answer : SOAP

Description : Communication between services is done widely using _______ protocol. a) REST b) SOAP c) RESTful d) None of the mentioned

Last Answer : SOAP

Description : Point out the correct statement. a) With PaaS, the goal is to create hosted scalable applications that are used in a Software as a Service model b) Applications built using PaaS tools need to ... , the data and transaction management conforms to the business rules you create d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) With PaaS, the goal is to create hosted scalable applications that are used in a Software as a Service model b) Applications built using PaaS tools need to ... the data and transaction management conforms to the business rules you create d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following provides commands for defining logic using conditional statements? a) XML b) WS-BPEL c) JSON d) None of the mentioned

Last Answer : WS-BPEL

Description : Exposing a stand-alone SOAP endpoint using the:- a) SimpleJaxWsServiceExporter b) JAX-WS c) All of the mentioned d) None of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : Point out the correct statement. a) Every third-party IM clients aim to allow their users to connect to the different major IM services b) SIP stands for Secure Initiation Protocol c) XMPP stands for Extensible Messaging and Presence Protocol d) All of the mentioned

Last Answer : XMPP stands for Extensible Messaging and Presence Protocol

Description : Point out the wrong statement. CSE-R17.BLOGSPOT.COM a) SOA provides the standards that transport the messages and makes the infrastructure to support it possible b) SOA provides access ... and widely shareable components that can minimize developer and infrastructure costs d) None of the mentioned

Last Answer : SOA provides access to reusable Web services over an SMTP network

Description : Point out the wrong statement. a) SOA provides the standards that transport the messages and makes the infrastructure to support it possible b) SOA provides access to reusable Web services ... widely shareable components that can minimize developer and infrastructure costs d) None of the mentioned

Last Answer : SOA provides access to reusable Web services over an SMTP network

Description : Which of the following is a specification for multicast discovery on a LAN? a) WS-Agent b) WS-Discovery c) WS-SOAP d) All of the mentioned

Last Answer : WS-Discovery

Description : Which of the following provides commands for defining logic using conditional statements?a) XML b) WS-BPEL c) JSON d) None of the mentioned

Last Answer : WS-BPEL

Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned

Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable

Description : Point out the wrong statement. a) Some APIs are both exposed as SOAP and REST b) The role of a cloud vendor specific API has impact on porting an application c) There are mainly three types of cloud storage d) None of the mentioned

Last Answer : There are mainly three types of cloud storage

Description : .Point out the wrong statement. a) Some APIs are both exposed as SOAP and REST b) Most APIs are exposed as SOAP c) Few APIs are exposed as REST d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the wrong statement. a) Some APIs are both exposed as SOAP and REST b) The role of a cloud vendor specific API has impact on porting an application c) There are mainly three types of cloud storage d) None of the mentioned

Last Answer : There are mainly three types of cloud storage

Description : Point out the correct statement. a) Eucalyptus and Rackspace both use Amazon EC2 and S3 services b) The RightScale user interface provides real-time measurements of individual server instances c) ... technology are highly configurable and can be run under batch control d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Wolf Frameworks uses a C# engine and supports both Microsoft SQL Server and MySQL database b) Applications built in Wolf are 50-percent browser-based ... and multisource overlaid content c) Google applications are cloud-based applications d) None of the mentioned

Last Answer : Applications built in Wolf are 50-percent browser-based and support mashable and multisource overlaid content

Description : Point out the wrong statement. a) Wolf Frameworks uses a C# engine and supports both Microsoft SQL Server and MySQL database b) Applications built in Wolf are 50-percent browser-based ... and multisource overlaid content c) Google applications are cloud-based applications d) None of the mentioned

Last Answer : Applications built in Wolf are 50-percent browser-based and support mashable and multisource overlaid content

Description : Which of the following allows a distributed ID system to write and enforce custom policy expressions? a) XACML b) XML c) SOAP d) None of the mentioned

Last Answer : XACML

Description : Which of the following allows a distributed ID system to write and enforce custom policy expressions? a) XACML b) XML c) SOAP d) None of the mentioned

Last Answer : XACML

Description : Which of the following protocol lets a Web site list in an XML file information? a) Sitemaps b) Mashups c) Hashups d) All of the mentioned

Last Answer : Sitemaps

Description : To publish a REST service with Spring. a) publishing an application’s data as a REST service b) accessing data from third-party REST services c) none of the mentioned d) all of the mentioned

Last Answer : all of the mentioned

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : XML tag which represents information related to a REST service request. a) Result b) Title c) None of the mentioned CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : All of the mentioned

Description : Which statement is true about a cloud computing environment? A. It cannot be used to host location based applications. B. It enables users to access systems regardless of their location. C. It introduces ... D. It can improve a web server response time by having servers closer to the end user.

Last Answer : It enables users to access systems regardless of their location.

Description : Which is the protocol for performing RPCs between applications in a language and system independent way? (A) Hyper Text Transmission Protocol (HTTP) (B) Simple Network Management Protocol (SNMP) (C) Simple Object Access Protocol (SOAP) (D) Simple Mail Transfer Protocol (SMTP)

Last Answer : (C) Simple Object Access Protocol (SOAP)

Description : Point out the wrong statement. a) Atom is a syndication format that allows for HTTP protocols to create and update information b) Cloud services span the gamut of computer applications c) ... discourage the use of open-network protocols in place of proprietary protocols d) None of the mentioned

Last Answer : The impact of cloud computing on network communication is to discourage the use of open-network protocols in place of proprietary protocols

Description : Which of the following is based on the IETF Session Initiation Protocol? a) WSDL b) SIMPLE c) SOAP d) All of the mentioned

Last Answer : SIMPLE

Description : It helps a user to have remote access to an application from a server. a) Application virtualization b) Network virtualization c) Desktop virtualization d) Storage virtualization

Last Answer : Application virtualization

Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned

Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications

Description : Point out the wrong statement. a) XML checks the ID request against its policies and either allows or denies the request b) SPML in most instances operates as a reply/request mechanism c) User centric authentication takes place usually in the form of knowledge cards d) All of the mentioned

Last Answer : SPML in most instances operates as a reply/request mechanism

Description : The properties necessary to guarantee a reliable transaction in databases and other applications is referred to as _____________ a) BASE b) ACID c) ATOM d) All of the mentioned

Last Answer : ACID

Description : The properties necessary to guarantee a reliable transaction in databases and other applications is referred to as _____________ a) BASE b) ACID c) ATOM d) All of the mentioned

Last Answer : ACID

Description : Applications can use the ____________ to report progress and set application-level status messages. a) Partitioner b) OutputSplit c) Reporter d) All of the mentioned

Last Answer : Reporter

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : Point out the wrong statement. a) Taken as a unit, Request => Process => Response is not an atomic transaction b) A coherent transaction either succeeds and is enacted, or ... transaction commitment in a multiuser application, durability requires correcting the condition d) None of the mentioned

Last Answer : Taken as a unit, “Request => Process => Response” is not an atomic transaction

Description : Point out the wrong statement. A. Yahoo Exchange platform added features to compete with Notes B. SIP stands for Session Initiation Protocol C. Citrix GoToMeeting is one of the best-known collaboration software product D. All of the above

Last Answer : Yahoo Exchange platform added features to compete with Notes

Description : REST is acronym for________ A. Representational State Transfer B. Represent State Transfer C. Representational State Transmit D. Representational Store Transfer

Last Answer : A. Representational State Transfer 

Description : Point out the correct statement. a) Virtual machines are containers that are assigned specific resources b) Applications need not be mindful of how they use cloud resources c) When a developer ... a cloud service, the developer cannot attach to the appropriate service d) All of the mentioned

Last Answer : Virtual machines are containers that are assigned specific resources

Description : Point out the correct statement. a) Mapper maps input key/value pairs to a set of intermediate key/value pairs b) Applications typically implement the Mapper and Reducer interfaces to provide the map and ... methods c) Mapper and Reducer interfaces form the core of the job d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the correct statement. a) PaaS supplies the infrastructure b) IaaS adds application development frameworks, transactions, and control structures c) SaaS is an operating environment with applications, management, and the user interface d) All of the mentioned

Last Answer : SaaS is an operating environment with applications, management, and the user interface

Description : Point out the correct statement. a) The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements b) To determine the particular ... you normally use for your applications only CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying

Description : Point out the correct statement. a) Virtual machines are containers that are assigned specific resources b) Applications need not be mindful of how they use cloud resources c) When a developer ... uses a cloud service, the developercannot attach to the appropriate service d) All of the mentioned

Last Answer : Virtual machines are containers that are assigned specific resources

Description : Applications such as a Web server or database server that can run on a virtual machine image are referred to as ______________ a) virtual server b) virtual appliances c) machine imaging d) all of the mentioned

Last Answer : virtual appliances

Description : Applications such as a Web server or database server that can run on a virtual machine image are referred to as ______________ a) virtual server b) virtual appliances c) machine imaging d) all of the mentioned

Last Answer : virtual appliances