Which of the following attribute should be unique?
 a) identity
 b) digital identity
 c) mashup
 d) all
of the mentioned

1 Answer

Answer :

digital identity

Related questions

Description : Which of the following group is dedicated to support technologies that implement enterprise mashups? a) Open Alliance Apache b) Open Mashup Alliance c) Open Tech Alliance d) None of the mentioned

Last Answer : Open Mashup Alliance

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : Which of the following group is dedicated to support technologies that implement enterprise mashups? A. Open Alliance Apache B. Open Mashup Alliance C. Open Tech Alliance D. None of the above

Last Answer : Open Mashup Alliance

Description : A ________ is an application that can display a Web page that shows data and supports features from two or more sources. A. workspace B. workload C. mashup D. Multitenant

Last Answer : mashup

Description : Which of the following is incorrect? a) Layered architectures are highly changeable, so this pattern can be used when changeability is an important quality attribute CSE-R17.BLOGSPOT.COM b) Layered-style programs ... of the rest of the program c) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned

Last Answer : A Compliance as a Service application would need to serve as a trusted third party

Description : The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service. a) Higgins b) Hughes c) Hinges d) All of the mentioned

Last Answer : Higgins

Description : Which of the following standard is concerned with the exchange and control of identity information? a) IGK b) IDF c) IGF d) All of the mentioned

Last Answer : IGF

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : Which of the following is provided by Identity as a Service? a) Identity governance b) Provisioning c) Risk and event monitoring d) All of the mentioned

Last Answer : All of the mentioned

Description : _________ is one of the more expensive and complex areas of network computing. a) Multi-Factor Authentication b) Fault tolerance c) Identity protection d) All of the mentioned

Last Answer : Identity protection

Description : ________ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks. a) Internet Hardware Addresses b) Ethernet Software Addresses c) Ethernet Hardware Addresses d) None of the mentioned

Last Answer : Ethernet Hardware Addresses

Description : Point out the correct statement. a) Mashups are an incredibly useful hybrid Web application b)SaaS will eventually replace all locally installed software c) The establishment and proof of identity is a central network function d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is considered an essential element in cloud computing by CSA? a) Multi-tenancy b) Identity and access management c) Virtualization d) All of the mentioned

Last Answer : Virtualization

Description : Which of the following is one of the unique attributes of Cloud Computing? a) utility type of delivery b) elasticity c) low barrier to entry d) all of the mentioned

Last Answer : all of the mentioned

Description : Which of the following is one of the unique attributes of Cloud Computing? a) utility type of delivery b) elasticity c) low barrier to entry d) all of the mentioned

Last Answer : all of the mentioned

Description : A digital code attached to an electronic message to provide it unique identity is called ………… -Technology

Last Answer : A digital code attached to an electronic message to provide it unique identity is calleddigital signature.

Description : A digital signature is a. a bit string giving identity of a correspondent b. a unique identification of a sender c. an authentication of an electronic record by tying it uniquely to a key only a sender knows d. an encrypted signature of a sender 

Last Answer : c. an authentication of an electronic record by tying it uniquely to a key only a sender knows

Description : Point out the wrong statement. A. Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems B. The Distributed Audit ... CardSpace specifications support the authentication type of data object D. All of the above

Last Answer : The OpenID and CardSpace specifications support the authentication type of data object

Description : The _________ Open Source Identity Framework uses an i-Card metaphor. A. Hughes B. Higgins C. Hinges D. XACML

Last Answer : Higgins

Description : It offers users to login into multiple websites with single account. A. FIDM B. OpenID C. SSO D. Identity

Last Answer : OpenID

Description : IDaaS stands for? A. ID-as-a-Service B. Identity-as-a-Service C. Intranet-as-a-service D. Interoperability-as-a-Service

Last Answer : Identity-as-a-Service

Description : . ________________ is yet another service model, which includes Network-as-a-Service, Business-as-a-Service, Identity-as-a-Service, Database-as-a-Service or Strategy-as-a-Service. A. IaaS B. PaaS C. SaaS D. XaaS

Last Answer : . XaaS

Description : Which is considered as an emerging industry best practice for dealing with dynamic and loosely coupled trust relationships in the collaboration model of an organization in Identity and Access management a) Identity federation b) Cloud federation c) Security federation d) None of the above

Last Answer : Identity federation

Description : Which of the following is considered an essential element in cloud computing? a) Multi-tenancy b) Identity and access management c) Virtualization d) None of the above

Last Answer : Multi-tenancy

Description : A hybrid cloud combines multiple clouds where those clouds retain their unique identities but are bound together as a unit. a) Public b) Private c) Community d) Hybrid

Last Answer : Hybrid

Description : Which of the following is one of the unique attributes of Cloud Computing? a) utility type of delivery b) elasticity c) low barrier to entry

Last Answer : all of the mentioned

Description : Where can I find an epic mashup of the top dance songs from the 70's, 80's, 90's, and 2000's?

Last Answer : www.playlist.com

Description : Is there a mashup or iPhone app that will tell me where I can buy a specific product locally?

Last Answer : Not sure about in stock but Snaptell is pretty good for taking my location and a photo I take of the product and giving me the list of local places and prices for the item. It is not foolproof but it is free.

Description : Email is _________ A. Loss-tolerant application B. Bandwidth-sensitive application C. Elastic application D. None of the mentioned

Last Answer : C. Elastic application

Description : Which of the following network resources can be load balanced? a) Connections through intelligent switches b) DNS c) Storage resources d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : The technology used to distribute service requests to resources is referred to as _____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned

Last Answer : load balancing

Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Which of the following correctly represents different types of mobile patterns? a) b) c) d) All of the mentioned

Last Answer : a)

Description : _________ is used for merchant transactions under the Payment Card Industry Data Security Standard. a) ClearPoint PCI b) ClearSoln c) Rackserve PCI d) All of the mentioned

Last Answer : ClearPoint PCI

Description : Which of the following is a PCI CaaS service? a) FedCloud b) ClearSoln c) Rackserve PCI d) All of the mentioned

Last Answer : ) Rackserve PCI

Description : Which of the following can be used for the banking industry? a) athenahealth b) bankserve c) bankingsol d) all of the mentioned

Last Answer : bankserve

Description : Which of the following is a man-in-the-middle type of service? a) CaaS b) IaaS c) AaaS d) All of the mentioned

Last Answer : CaaS

Description : Which of the following allows a distributed ID system to write and enforce custom policy expressions? a) XACML b) XML c) SOAP d) None of the mentioned

Last Answer : XACML

Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned

Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable

Description : Which of the following is an example of a vertical cloud that advertise CaaS capabilities? a) FedCloud b) ClearPoint PCI c) Rackserve PCI d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following should come in place of question mark for the following figure? a) Policy Enforcement Point b) Policy Decision Pointc) Policy Insertion Point d) All of the mentioned

Last Answer : Policy Decision Point

Description : Which of the following is authorization markup language? a) eXtensible Access Control Markup Language b) intrinsic Access Control Markup Language c) hypertext Access Control Markup Language d) all of the mentioned

Last Answer : eXtensible Access Control Markup Language

Description : Which of the following allows a distributed ID system to write and enforce custom policy expressions? a) XACML b) XML c) SOAP d) None of the mentioned

Last Answer : XACML

Description : Point out the wrong statement. a) XML checks the ID request against its policies and either allows or denies the request b) SPML in most instances operates as a reply/request mechanism c) User centric authentication takes place usually in the form of knowledge cards d) All of the mentioned

Last Answer : SPML in most instances operates as a reply/request mechanism

Description : Any software application that complies with the standard accepts a _______ that is authenticated by a trusted provider. a) OpenID b) OpenUser c) OpenSSD d) None of the mentioned

Last Answer : OpenID

Description : __________ authentication requires the outside use of a network security or trust service. a) SSO b) Singlefactor c) Multi Factor d) All of the mentioned

Last Answer : Multi Factor

Description : The componentized nature of SaaS solutions enables many solutions to support a feature called _____________ a) workspace b) workloads c) mashups d) all of the mentioned

Last Answer : mashups