Description : Which of the following allows a distributed ID system to write and enforce custom policy expressions? a) XACML b) XML c) SOAP d) None of the mentioned
Last Answer : XACML
Description : Point out the wrong statement. a) XML checks the ID request against its policies and either allows or denies the request b) SPML in most instances operates as a reply/request mechanism c) User centric authentication takes place usually in the form of knowledge cards d) All of the mentioned
Last Answer : SPML in most instances operates as a reply/request mechanism
Description : _______ is an XML request/response language that is used to integrate and interoperate service provisioning requests. A. XACML B. FIDM C. SPML D. SSP
Last Answer : SPML
Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned
Last Answer : REST stands for Representational State Transfer
Description : The _________ Open Source Identity Framework uses an i-Card metaphor. A. Hughes B. Higgins C. Hinges D. XACML
Last Answer : Higgins
Description : Which of the following allows a virtual machine to run on two or more physical processors at the same time? a) Virtual SMP b) Distributed Resource Scheduler c) vNetwork Distributed Switch d) Storage VMotion
Last Answer : Virtual SMP
Description : Which statement best describes the Software as a Service cloud delivery model? A. A virtual machine provisioned and provided from the cloud which allows the customer to deploy custom ... and run the application on the customer's own computers and simplifying maintenance and support.
Last Answer : An application delivered to the client from the cloud which eliminates the need to install and run the application on the customer's own computers and simplifying maintenance and support.
Description : The most commonly used set of protocols uses ______ as the messaging format. a) XML b) JSON c) BSON d) All of the mentioned
Last Answer : XML
Description : In contrast, the contract-first approach encourages you to think of the service contract first in terms of :- a) XML b) XML Schema(.xsd) c) WSDL d) All of the mentioned
Last Answer : All of the mentioned
Description : XML tag which represents information related to a REST service request. a) Result b) Title c) None of the mentioned CSE-R17.BLOGSPOT.COM d) All of the mentioned
Description : The marshaller used by MarshallingView belongs to one of a series of XML marshallers. a) Jaxb2Marshaller b) XmlBeansMarshaller c) CastorMarshalle d) All of the mentioned
Description : Which of the following is used as middleware layer in the following figure? a) XML b) ESB c) UDDI d) None of the mentioned
Last Answer : ESB
Description : Which of the following is commonly used to describe the service interface, how to bind information, and the nature of the component’s service or endpoint? a) WSDL b) SCDL c) XML d) None of the mentioned
Last Answer : WSDL
Description : Which of the following is used to define the service component that performs the service? a) WSDL b) SCDL c) XML d) None of the mentioned
Last Answer : SCDL
Description : Which of the following protocol lets a Web site list in an XML file information? a) Sitemaps b) Mashups c) Hashups d) All of the mentioned
Last Answer : Sitemaps
Description : Which of the following provides commands for defining logic using conditional statements? a) XML b) WS-BPEL c) JSON d) None of the mentioned
Last Answer : WS-BPEL
Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned
Last Answer : The OpenID and
Description : In distributed system, each processor has its own ___________ a) local memory b) clock c) both local memory and clock d) none of the mentioned
Last Answer : both local memory and clock
Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned
Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses
Description : Which of the following standard connect distributed hosts or tenants to their provisioned storage in the cloud? a) CDMI b) OCMI c) COA d) All of the mentioned
Last Answer : CDMI
Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned
Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications
Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned
Description : In distributed systems, link and site failure is detected by ___________ a) polling b) handshaking c) token passing d) none of the mentioned
Last Answer : handshaking
Description : _______ feature allows you to optimize your system and capture all possible transactions. a) scalability b) reliability c) elasticity d) none of the mentioned
Last Answer : elasticity
Description : Users can control which keys (and hence records) go to which Reducer by implementing a custom? a) Partitioner b) OutputSplit c) Reporter d) All of the mentioned
Last Answer : Partitioner
Description : Which of the following is based on the IETF Session Initiation Protocol? a) WSDL b) SIMPLE c) SOAP d) All of the mentioned
Last Answer : SIMPLE
Description : Which of the following is a specification for multicast discovery on a LAN? a) WS-Agent b) WS-Discovery c) WS-SOAP d) All of the mentioned
Last Answer : WS-Discovery
Description : Which of the following lets a Web service advertise itself in terms of a collection of endpoints? a) WSDL b) VMc c) SOAP d) All of the mentioned
Description : Communication between services is done widely using _______ protocol. a) REST b) SOAP c) RESTful d) None of the mentioned
Last Answer : SOAP
Description : Point out the wrong statement. a) Some APIs are both exposed as SOAP and REST b) The role of a cloud vendor specific API has impact on porting an application c) There are mainly three types of cloud storage d) None of the mentioned
Last Answer : There are mainly three types of cloud storage
Description : Exposing a stand-alone SOAP endpoint using the:- a) SimpleJaxWsServiceExporter b) JAX-WS c) All of the mentioned d) None of the mentioned
Description : .Point out the wrong statement. a) Some APIs are both exposed as SOAP and REST b) Most APIs are exposed as SOAP c) Few APIs are exposed as REST d) None of the mentioned
Last Answer : None of the mentioned
Description : ________ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks. a) Internet Hardware Addresses b) Ethernet Software Addresses c) Ethernet Hardware Addresses d) None of the mentioned
Last Answer : Ethernet Hardware Addresses
Description : Point out the wrong statement. a) Atom is a syndication format that allows for HTTP protocols to create and update information b) Cloud services span the gamut of computer applications c) ... discourage the use of open-network protocols in place of proprietary protocols d) None of the mentioned
Last Answer : The impact of cloud computing on network communication is to discourage the use of open-network protocols in place of proprietary protocols
Description : Moving expenses onto the _____ side of a budget allows an organization to transfer risk to their cloud computing provider. a) Dex b) OpEx c) Pex d) All of the mentioned
Last Answer : OpEx
Description : Point out the wrong statement. a) Google App Engine allows a developer to scale an application immediately b) The customer relationship management provider SalesForce.com has a development platform called Force. ... become a hub master at the center of many ISVs offerings d) None of the mentioned
Last Answer : The customer relationship management provider SalesForce.com has a development platform called Force.com that is an IaaS offering
Description : Which of the following model allows vendor to provide security as part of the Service Level Agreement? a) SaaS b) PaaS c) IaaS d) All of the mentioned
Last Answer : SaaS
Description : _________ allows different operating systems to run in their own memory space. a) VGM b) VMc c) VMM d) All of the mentioned
Last Answer : VMM
Description : General-purpose class that allows a response to be rendered using a marshaller. a) MarshallingView b) Marshalling c) View d) All of the mentioned
Last Answer : MarshallingView
Description : The service FreeDrive is storage that allows ________ users to view the content of others. a) Facebook b) Twitter c) Whatsapp d) None of the mentioned Answer: a Explanation: FreeDrive is a p
Last Answer : Facebook
Description : ________ is a utility which allows users to create and run jobs with any executables as the mapper and/or the reducer. a) Hadoop Strdata b) Hadoop Streaming c) Hadoop Stream d) None of the mentioned
Last Answer : Hadoop Streaming