Which of the following allows a distributed ID system to write and enforce custom policy
expressions?
 a) XACML
 b) XML
 c) SOAP
 d) None of the mentioned

1 Answer

Answer :

XACML

Related questions

Description : Which of the following allows a distributed ID system to write and enforce custom policy expressions? a) XACML b) XML c) SOAP d) None of the mentioned

Last Answer : XACML

Description : Point out the wrong statement. a) XML checks the ID request against its policies and either allows or denies the request b) SPML in most instances operates as a reply/request mechanism c) User centric authentication takes place usually in the form of knowledge cards d) All of the mentioned

Last Answer : SPML in most instances operates as a reply/request mechanism

Description : _______ is an XML request/response language that is used to integrate and interoperate service provisioning requests. A. XACML B. FIDM C. SPML D. SSP

Last Answer : SPML

Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned

Last Answer : REST stands for Representational State Transfer

Description : The _________ Open Source Identity Framework uses an i-Card metaphor. A. Hughes B. Higgins C. Hinges D. XACML

Last Answer : Higgins

Description : Which of the following allows a virtual machine to run on two or more physical processors at the same time? a) Virtual SMP b) Distributed Resource Scheduler c) vNetwork Distributed Switch d) Storage VMotion

Last Answer : Virtual SMP

Description : Which statement best describes the Software as a Service cloud delivery model? A. A virtual machine provisioned and provided from the cloud which allows the customer to deploy custom ... and run the application on the customer's own computers and simplifying maintenance and support.

Last Answer : An application delivered to the client from the cloud which eliminates the need to install and run the application on the customer's own computers and simplifying maintenance and support.

Description : The most commonly used set of protocols uses ______ as the messaging format. a) XML b) JSON c) BSON d) All of the mentioned

Last Answer : XML

Description : In contrast, the contract-first approach encourages you to think of the service contract first in terms of :- a) XML b) XML Schema(.xsd) c) WSDL d) All of the mentioned

Last Answer : All of the mentioned

Description : XML tag which represents information related to a REST service request. a) Result b) Title c) None of the mentioned CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : All of the mentioned

Description : The marshaller used by MarshallingView belongs to one of a series of XML marshallers. a) Jaxb2Marshaller b) XmlBeansMarshaller c) CastorMarshalle d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is used as middleware layer in the following figure? a) XML b) ESB c) UDDI d) None of the mentioned

Last Answer : ESB

Description : Which of the following is commonly used to describe the service interface, how to bind information, and the nature of the component’s service or endpoint? a) WSDL b) SCDL c) XML d) None of the mentioned

Last Answer : WSDL

Description : Which of the following is used to define the service component that performs the service? a) WSDL b) SCDL c) XML d) None of the mentioned

Last Answer : SCDL

Description : Which of the following protocol lets a Web site list in an XML file information? a) Sitemaps b) Mashups c) Hashups d) All of the mentioned

Last Answer : Sitemaps

Description : Which of the following is used as middleware layer in the following figure? a) XML b) ESB c) UDDI d) None of the mentioned

Last Answer : ESB

Description : Which of the following provides commands for defining logic using conditional statements? a) XML b) WS-BPEL c) JSON d) None of the mentioned

Last Answer : WS-BPEL

Description : Which of the following is commonly used to describe the service interface, how to bind information, and the nature of the component’s service or endpoint? a) WSDL b) SCDL c) XML d) None of the mentioned

Last Answer : WSDL

Description : Which of the following is used to define the service component that performs the service? a) WSDL b) SCDL c) XML d) None of the mentioned

Last Answer : SCDL

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : In distributed system, each processor has its own ___________ a) local memory b) clock c) both local memory and clock d) none of the mentioned

Last Answer : both local memory and clock

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : Which of the following standard connect distributed hosts or tenants to their provisioned storage in the cloud? a) CDMI b) OCMI c) COA d) All of the mentioned

Last Answer : CDMI

Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned

Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : In distributed systems, link and site failure is detected by ___________ a) polling b) handshaking c) token passing d) none of the mentioned

Last Answer : handshaking

Description : Which of the following standard connect distributed hosts or tenants to their provisioned storage in the cloud? a) CDMI b) OCMI c) COA d) All of the mentioned

Last Answer : CDMI

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : _______ feature allows you to optimize your system and capture all possible transactions. a) scalability b) reliability c) elasticity d) none of the mentioned

Last Answer : elasticity

Description : _______ feature allows you to optimize your system and capture all possible transactions. a) scalability b) reliability c) elasticity d) none of the mentioned

Last Answer : elasticity

Description : Users can control which keys (and hence records) go to which Reducer by implementing a custom? a) Partitioner b) OutputSplit c) Reporter d) All of the mentioned

Last Answer : Partitioner

Description : Which of the following is based on the IETF Session Initiation Protocol? a) WSDL b) SIMPLE c) SOAP d) All of the mentioned

Last Answer : SIMPLE

Description : Which of the following is a specification for multicast discovery on a LAN? a) WS-Agent b) WS-Discovery c) WS-SOAP d) All of the mentioned

Last Answer : WS-Discovery

Description : Which of the following lets a Web service advertise itself in terms of a collection of endpoints? a) WSDL b) VMc c) SOAP d) All of the mentioned

Last Answer : WSDL

Description : Communication between services is done widely using _______ protocol. a) REST b) SOAP c) RESTful d) None of the mentioned

Last Answer : SOAP

Description : Point out the wrong statement. a) Some APIs are both exposed as SOAP and REST b) The role of a cloud vendor specific API has impact on porting an application c) There are mainly three types of cloud storage d) None of the mentioned

Last Answer : There are mainly three types of cloud storage

Description : Communication between services is done widely using _______ protocol. a) REST b) SOAP c) RESTful d) None of the mentioned

Last Answer : SOAP

Description : Exposing a stand-alone SOAP endpoint using the:- a) SimpleJaxWsServiceExporter b) JAX-WS c) All of the mentioned d) None of the mentioned

Last Answer : All of the mentioned

Description : .Point out the wrong statement. a) Some APIs are both exposed as SOAP and REST b) Most APIs are exposed as SOAP c) Few APIs are exposed as REST d) None of the mentioned

Last Answer : None of the mentioned

Description : Communication between services is done widely using _______ protocol. a) REST b) SOAP c) RESTful d) None of the mentioned

Last Answer : SOAP

Description : Point out the wrong statement. a) Some APIs are both exposed as SOAP and REST b) The role of a cloud vendor specific API has impact on porting an application c) There are mainly three types of cloud storage d) None of the mentioned

Last Answer : There are mainly three types of cloud storage

Description : ________ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks. a) Internet Hardware Addresses b) Ethernet Software Addresses c) Ethernet Hardware Addresses d) None of the mentioned

Last Answer : Ethernet Hardware Addresses

Description : Point out the wrong statement. a) Atom is a syndication format that allows for HTTP protocols to create and update information b) Cloud services span the gamut of computer applications c) ... discourage the use of open-network protocols in place of proprietary protocols d) None of the mentioned

Last Answer : The impact of cloud computing on network communication is to discourage the use of open-network protocols in place of proprietary protocols

Description : Moving expenses onto the _____ side of a budget allows an organization to transfer risk to their cloud computing provider. a) Dex b) OpEx c) Pex d) All of the mentioned

Last Answer : OpEx

Description : Point out the wrong statement. a) Google App Engine allows a developer to scale an application immediately b) The customer relationship management provider SalesForce.com has a development platform called Force. ... become a hub master at the center of many ISVs offerings d) None of the mentioned

Last Answer : The customer relationship management provider SalesForce.com has a development platform called Force.com that is an IaaS offering

Description : Which of the following model allows vendor to provide security as part of the Service Level Agreement? a) SaaS b) PaaS c) IaaS d) All of the mentioned

Last Answer : SaaS

Description : _________ allows different operating systems to run in their own memory space. a) VGM b) VMc c) VMM d) All of the mentioned

Last Answer : VMM

Description : General-purpose class that allows a response to be rendered using a marshaller. a) MarshallingView b) Marshalling c) View d) All of the mentioned

Last Answer : MarshallingView

Description : The service FreeDrive is storage that allows ________ users to view the content of others. a) Facebook b) Twitter c) Whatsapp d) None of the mentioned Answer: a Explanation: FreeDrive is a p

Last Answer : Facebook

Description : ________ is a utility which allows users to create and run jobs with any executables as the mapper and/or the reducer. a) Hadoop Strdata b) Hadoop Streaming c) Hadoop Stream d) None of the mentioned

Last Answer : Hadoop Streaming