_________ is used for merchant transactions under the Payment Card Industry Data Security
Standard.
 a) ClearPoint PCI
 b) ClearSoln
 c) Rackserve PCI
 d) All of the mentioned

1 Answer

Answer :

ClearPoint PCI

Related questions

Description : Which of the following is a PCI CaaS service? a) FedCloud b) ClearSoln c) Rackserve PCI d) All of the mentioned

Last Answer : ) Rackserve PCI

Description : Which of the following is an example of a vertical cloud that advertise CaaS capabilities? a) FedCloud b) ClearPoint PCI c) Rackserve PCI d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is an example of a vertical cloud that advertise CaaS capabilities? a) FedCloud b) ClearPoint PCI c) Rackserve PCI d) All of the mentioned

Last Answer : CaaS

Description : Which of the following is a compliance standard? a) PCI-DSS b) HIPPA c) GLBA d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is a more sophisticated load balancer? a) workload managers b) workspace managers c) rackserve managers d) all of the mentioned

Last Answer : workload managers

Description : Which of the following is a more sophisticated load balancer? a) workload managers b) workspace managers c) rackserve managers d) all of the mentioned

Last Answer : workload managers

Description : Which of the following is a more sophisticated load balancer? a) workload managers b) workspace managers c) rackserve managers d)All of the mentioned

Last Answer : workload managers

Description : For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer. a) SaaS b) PaaS c) IaaS d) All of the mentioned

Last Answer : PaaS

Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Data Privacy

Description : Disadvantages of e-Commerce in India are  (i) internet access is not universally available  (ii) Credit card payment security is not yet guaranteed  (iii) Transactions are de-personalized and human contact is missing  (iv) Cyberlaws ... i and ii b. ii and iii c. i, ii, iii d. i, ii, iii, iv

Last Answer : c. i, ii, iii  

Description : _______ feature allows you to optimize your system and capture all possible transactions. a) scalability b) reliability c) elasticity d) none of the mentioned

Last Answer : elasticity

Description : Point out the correct statement. a) PaaS supplies the infrastructure b) IaaS adds application development frameworks, transactions, and control structures c) SaaS is an operating environment with applications, management, and the user interface d) All of the mentioned

Last Answer : SaaS is an operating environment with applications, management, and the user interface

Description : _______ feature allows you to optimize your system and capture all possible transactions. a) scalability b) reliability c) elasticity d) none of the mentioned

Last Answer : elasticity

Description : SaaS supports multiple users and provides a shared data model through _________ model. a) single-tenancy b) multi-tenancy c) multiple-instance d) all of the mentioned

Last Answer : multi-tenancy

Description : SaaS supports multiple users and provides a shared data model through _________ model. a) single-tenancy b) multi-tenancy c) multiple-instance d) all of the mentioned

Last Answer : multi-tenancy

Description : When a transaction is processed online, how can the merchant verify the customer's identity? a. use secure sockets layers b. use secure electronic transactions c. use electronic data interchange d. use financial electronic data interchange

Last Answer : b. use secure electronic transactions

Description : A company is considering a cloud environment to improve the operating efficiency for their dataand applications. The company is part of an industry where strict security and data privacy issues are of the highest ... a good choice? A. hybrid cloud B. public cloud C. private cloud D. governed cloud

Last Answer : private cloud

Description : ________ dimension corresponds to two different states in the eight possible cloud forms. a) Physical location of data b) Ownership c) Security boundary d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the wrong statement. a) Securing data sent to, received from, and stored in the cloud is the single largest security concern b) The problem with the data you store in the cloud is that ... the cloud from direct client access is to create layered access to the data d) All of the mentioned

Last Answer : One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data

Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Description : Which of the following are a common means for losing encrypted data? a) lose the keys b) lose the encryption standard c) lose the account d) all of the mentioned

Last Answer : lose the keys

Description : Which of the following is a payment processing system by Google? a) Paytm b) Checkout c) Code d) All of the mentioned

Last Answer : Checkout

Description : Which of the following is a payment processing system by Google? a) Paytm b) Checkout c) Code d) All of the mentioned

Last Answer : Checkout

Description : Email is _________ A. Loss-tolerant application B. Bandwidth-sensitive application C. Elastic application D. None of the mentioned

Last Answer : C. Elastic application

Description : _________ is one of the more expensive and complex areas of network computing. a) Multi-Factor Authentication b) Fault tolerance c) Identity protection d) All of the mentioned

Last Answer : Identity protection

Description : _________ applications have a much lower barrier to entry than their locally installed competitors. a) IaaS b) CaaS c) PaaS d) None of the mentioned

Last Answer : None of the mentioned

Description : _________ serves as a PaaS vendor within Google App Engine system. a) Google b) Amazon c) Microsoft d) All of the mentioned

Last Answer : Google

Description : Pods are aggregated into pools within an IaaS region or site called an _________ zone. a) restricted b) unavail c) availability d) none of the mentioned

Last Answer : availability

Description : _________ is designed specifically to run connected to the cloud as a dedicated cloud client. a) Harvera Tablet OS b) Fedora Netbook OS c) Jolicloud Netbook OS d) None of the mentioned

Last Answer : Jolicloud Netbook OS

Description : A _________ is a cloud computing service that is both hardware and software. a) service b)platform c) model d) all of the mentioned

Last Answer : platform

Description : The reputation for cloud computing services for the quality of those services is shared by _________ a) replicas b) shards c) tenantsd) all of the mentioned

Last Answer : tenants

Description : A service that concentrates on hardware follows the _________ as a Service model. a) IaaS b) CaaS c) PaaS d) All of the mentioned

Last Answer : IaaS

Description : _________ model consists of the particular types of services that you can access on a cloudcomputing platform. a) Service b) Deployment c) Application d) None of the mentioned

Last Answer : Service

Description : The framework groups Reducer inputs by key in _________ stage. a) sort b) shuffle c) reduce d) none of the mentioned

Last Answer : sort

Description : The number of reduces for the job is set by the user via _________ CSE-R17.BLOGSPOT.COM a) JobConf.setNumTasks(int)b) JobConf.setNumReduceTasks(int) c) JobConf.setNumMapTasks(int) d) All of the mentioned

Last Answer : JobConf.setNumReduceTasks(int)

Description : Redundancy has to be implemented at the _________ architectural level for effective results in cloud computing. a) lower b) higher c) middle d) all of the mentioned

Last Answer : higher

Description : _________ applications have a much lower barrier to entry than their locally installed competitors. a) IaaS b) CaaS c) PaaS d) None of the mentioned

Last Answer : None of the mentioned

Description : _________ allows different operating systems to run in their own memory space. a) VGM b) VMc c) VMM d) All of the mentioned

Last Answer : VMM

Description : A service that concentrates on hardware follows the _________ as a Service model. a) IaaS b) CaaS c) PaaS d) All of the mentioned

Last Answer : IaaS

Description : _________ serves as a PaaS vendor within Google App Engine system. a) Google b) Amazon c) Microsoft d) All of the mentioned

Last Answer : Google

Description : A service that concentrates on hardware follows the _________ as a Service model. a) IaaS b) CaaS c) PaaS d) All of the mentioned

Last Answer : IaaS

Description : Which is considered as an emerging industry best practice for dealing with dynamic and loosely coupled trust relationships in the collaboration model of an organization in Identity and Access management a) Identity federation b) Cloud federation c) Security federation d) None of the above

Last Answer : Identity federation

Description : The _________ Open Source Identity Framework uses an i-Card metaphor. A. Hughes B. Higgins C. Hinges D. XACML

Last Answer : Higgins

Description : __________ authentication requires the outside use of a network security or trust service. a) SSO b) Singlefactor c) Multi Factor d) All of the mentioned

Last Answer : Multi Factor

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : __________ is a measure of whether the operation is inside or outside the security boundary or network firewall. a) Per b) P c) Pre d) All of the mentioned

Last Answer : All of the mentioned

Description : How many types of security boundary values exist in Cloud Cube model? a) 1 b) 2 c) 3 d) None of the mentioned

Last Answer : 2

Description : Which of the following model type is not trusted in terms of security? a) Public b) Private c) Hybrid d) None of the mentioned

Last Answer : Private/Community

Description : Which of the following model allows vendor to provide security as part of the Service Level Agreement? a) SaaS b) PaaS c) IaaS d) All of the mentioned

Last Answer : SaaS

Description : Point out the wrong statement. a) Each different type of cloud service delivery model creates a security boundary b) Any security mechanism below the security boundary must be built into the system ... mechanism above the security boundary must be maintained by the customer d) All of the mentioned

Last Answer : All of the mentioned