Which of the following is provided by Identity as a Service?
 a) Identity governance
 b)
Provisioning
 c) Risk and event monitoring
 d) All of the mentioned

1 Answer

Answer :

All of the mentioned

Related questions

Description : Which of the following is a core management feature offered by most cloud management service products? a) Support of different cloud types b) Creation and provisioning of different types of cloud ... and uptime, response time, resource quota usage, and other characteristics d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned

Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable

Description : Point out the correct statement. a) Except for tightly managed SaaS cloud providers, the burden of resource management is still in the hands of the user b) Cloud computing vendors run very reliable ... barrier to entry cannot be accompanied by a low barrier to provisioning d) All of the mentioned

Last Answer : Cloud computing vendors run very reliable networks

Description : _______ is an XML request/response language that is used to integrate and interoperate service provisioning requests. A. XACML B. FIDM C. SPML D. SSP

Last Answer : SPML

Description : .Interconnecting the cloud computing environments of two or more service providers is called as a) Cloud Federation b) Intra Cloud c) Cloud Provisioning d) Cloud Connecting

Last Answer : Conceptual Level

Description : A Solution to overcome the challenge to support a large number of application service consumers from around the world, cloud infrastructure providers (i.e., IaaS providers) have established data ... ) Global exchange of cloud resources b) Resource provisioning c) Cloud security d) Resource sharing

Last Answer : Global exchange of cloud resources

Description : Point out the wrong statement. a) Cloudkick's Insight module is powerful and particularly easy to use CSE-R17.BLOGSPOT.COM b) Both Cloudkick and RightScale are knownto be easy to use with ... with Linux instances c) All of the service models support monitoring solutions d) All of the mentioned

Last Answer : Both Cloudkick and RightScale are known

Description : When you deploy an application on Google’s PaaS App Engine cloud service, the Administration Console provides you with the which of the following monitoring capabilities? a) View data and error logs b) Analyze your network traffic c) View the application’s scheduled tasks d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned

Last Answer : A Compliance as a Service application would need to serve as a trusted third party

Description : The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service. a) Higgins b) Hughes c) Hinges d) All of the mentioned

Last Answer : Higgins

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : Which of the following statement is true about virtualization technology? A. Allows manual provisioning of environments. B. Administrationsoftware constantly monitors the software. C. Save energy by powering off the servers. D. Allows automatic deployment of applications.

Last Answer : Allows automatic deployment of applications.

Description : .In an enterprise-level model of technology by which a customer can purchase cloud services as and when needed is called as a) On-Demand Computing b) Resource Provisioning c) Over Provisioning d) Under Provisioning

Last Answer : On-Demand Computing

Description : If an enterprise has too many resources and they will be paying for assets they aren’t using is termed as a) Under provisioning b) Elasticity c) Over provisioning d) None of the above

Last Answer : Over provisioning

Description : Which of the following captive area deals with monitoring? a) Licensed b) Variable but under control c) Low d) All of the mentioned

Last Answer : Variable but under

Description : Which of the following benefit is provided by the PaaS service provider? a) A larger pool of qualified developers b) More reliable operation c) A logical design methodology d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following benefit is provided by the PaaS service provider? a) A larger pool of qualified developers b) More reliable operation c) A logical design methodology d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following benefit is provided by the PaaS service provider? a) A larger pool of qualified developers b) More reliable operation c) A logical design methodology d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following standard is concerned with the exchange and control of identity information? a) IGK b) IDF c) IGF d) All of the mentioned

Last Answer : IGF

Description : _________ is one of the more expensive and complex areas of network computing. a) Multi-Factor Authentication b) Fault tolerance c) Identity protection d) All of the mentioned

Last Answer : Identity protection

Description : ________ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks. a) Internet Hardware Addresses b) Ethernet Software Addresses c) Ethernet Hardware Addresses d) None of the mentioned

Last Answer : Ethernet Hardware Addresses

Description : Which of the following attribute should be unique? a) identity b) digital identity c) mashup d) all of the mentioned

Last Answer : digital identity

Description : Point out the correct statement. a) Mashups are an incredibly useful hybrid Web application b)SaaS will eventually replace all locally installed software c) The establishment and proof of identity is a central network function d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is considered an essential element in cloud computing by CSA? a) Multi-tenancy b) Identity and access management c) Virtualization d) All of the mentioned

Last Answer : Virtualization

Description : Point out the wrong statement. A. Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems B. The Distributed Audit ... CardSpace specifications support the authentication type of data object D. All of the above

Last Answer : The OpenID and CardSpace specifications support the authentication type of data object

Description : IDaaS stands for? A. ID-as-a-Service B. Identity-as-a-Service C. Intranet-as-a-service D. Interoperability-as-a-Service

Last Answer : Identity-as-a-Service

Description : . ________________ is yet another service model, which includes Network-as-a-Service, Business-as-a-Service, Identity-as-a-Service, Database-as-a-Service or Strategy-as-a-Service. A. IaaS B. PaaS C. SaaS D. XaaS

Last Answer : . XaaS

Description : Moving expenses onto the _____ side of a budget allows an organization to transfer risk to their cloud computing provider. a) Dex b) OpEx c) Pex d) All of the mentioned

Last Answer : OpEx

Description : Applications that work with cloud computing that have low margins and usually low risk are _____________ a) high touch b) low touch c) moderate touch d) all of the mentioned

Last Answer : low touch

Description : The following flowchart is intended to evaluate __________ in any cloud. a) risk b) errors c) inconsistencies d) none of the mentioned

Last Answer : risk

Description : Applications that work with cloud computing that have low margins and usually low risk are _____________ a) high touch b) low touch c) moderate touch d) all of the mentioned

Last Answer : low touch

Description : The management model that facilitates effective and efficient security management and operations in the cloud environment so that an enterprise’s business targets are achieved is a) Cloud security b) Trust model c) Security model d) Cloud security governance

Last Answer : Cloud security governance

Description : Which of the following is provided by ownership dimension of Cloud Cube Model? a) Proprietary b) Owner c) P d) All of the mentioned

Last Answer : Owner

Description : Which of the following is not provided by “Deep Web”? a) Database generated Web pages b) Private or limited access Web pages c) Pages without links d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following figure correctly describe major features provided by Google App Engine? a) b) c)d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is incorrect? a) A Layered-style program is divided into an array of modules or layers b) Each layer provides services to the layer “below” and makes use of services provided by the layer “above” c) All of the mentioned d) None of the mentioned

Last Answer : Each layer provides services to the layer “below” and makes use of services provided by the layer “above”

Description : Which of the following is not provided by “Deep Web”? a) Database generated Web pages b) Private or limited access Web pages c) Pages without links d) All of the mentioned

Last Answer : All of the

Description : Which of the following figure correctly describe major features provided by Google App Engine? a) b) c) d) All of the mentioned

Last Answer : All of the mentioned

Description : Bleeding complications are frequently associated with fibrinolytic therapy. Which of the following statement(s) concerning complications of fibrinolytic therapy is/are true? a. Careful monitoring of prothrombin time ... months ago can be treated with fibrinolytic therapy if head CT scan is normal

Last Answer : Answer: b Fibrinolytic therapy induces a hemostatic defect through a combination of factors. Hypofibrinogenemia and fibrin degradation products inhibit fibrin polymerization and, in combination ... is considered a major relative contraindication to either regional or systemic thrombolytic therapy

Description : Cloud computing architecture is a combination of? A. service-oriented architecture and grid computing B. utility computing and event-driven architecture. C. service-oriented architecture and event-driven architecture. D. virtualization and event-driven architecture.

Last Answer : service-oriented architecture and event-driven architecture.

Description : Which of the following is related to the service provided by Cloud? a) Sourcing b) Ownership c) Reliability d) AaaS

Last Answer : Sourcing

Description : Which resources are typically provided by an Infrastructure as a Service cloud computing delivery model? A. applications B. virtual machines C. virtual private networks D. middleware software stacks

Last Answer : middleware software stacks

Description : Which statement best describes the Software as a Service cloud delivery model? A. A virtual machine provisioned and provided from the cloud which allows the customer to deploy custom ... and run the application on the customer's own computers and simplifying maintenance and support.

Last Answer : An application delivered to the client from the cloud which eliminates the need to install and run the application on the customer's own computers and simplifying maintenance and support.

Description : Which resources are typically provided by an Infrastructure as a Service cloud computing delivery model? A. applications B. virtual machines C. virtual private networks D. middleware software stacks

Last Answer : virtual machines

Description : Which of the following is related to the service provided by Cloud? A. Sourcing B. Ownership C. Reliability D. PaaS

Last Answer : Sourcing

Description : The _________ Open Source Identity Framework uses an i-Card metaphor. A. Hughes B. Higgins C. Hinges D. XACML

Last Answer : Higgins

Description : It offers users to login into multiple websites with single account. A. FIDM B. OpenID C. SSO D. Identity

Last Answer : OpenID

Description : Which is considered as an emerging industry best practice for dealing with dynamic and loosely coupled trust relationships in the collaboration model of an organization in Identity and Access management a) Identity federation b) Cloud federation c) Security federation d) None of the above

Last Answer : Identity federation

Description : Which of the following is considered an essential element in cloud computing? a) Multi-tenancy b) Identity and access management c) Virtualization d) None of the above

Last Answer : Multi-tenancy