x

Recent tagged cloud-computing


Email is _________ A. Loss-tolerant application B. Bandwidth-sensitive application C. Elastic application D. None of the mentioned
Last Answer : C. Elastic application

Show More

34 views 1 answer



Which of the following network resources can be load balanced? a) Connections through intelligent switches b) DNS c) Storage resources d) All of the mentioned
Last Answer : All of the mentioned

Show More

11 views 1 answer



Which of the following software can be used to implement load balancing? a) Apache mod_balancer b) Apache mod_proxy_balancer þÿ

Show More

1 view 0 answers



Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned
Last Answer : All of the mentioned

Show More

5 views 1 answer



The technology used to distribute service requests to resources is referred to as _____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned
Last Answer : load balancing

Show More

13 views 1 answer



Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned
Last Answer : All of the mentioned

Show More

60 views 1 answer



Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned
Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Show More

27 views 1 answer



Which of the following correctly represents different types of mobile patterns? a) b) c) d) All of the mentioned
Last Answer : a)

Show More

6 views 1 answer



________ as a Service is a development environment that builds upon an existing cloud computing application infrastructure. a) Software b) Platform c) Analytics d) Compliance
Last Answer : Platform

Show More

35 views 1 answer



_________ is used for merchant transactions under the Payment Card Industry Data Security Standard. a) ClearPoint PCI b) ClearSoln c) Rackserve PCI d) All of the mentioned
Last Answer : ClearPoint PCI

Show More

2 views 1 answer



Which of the following is a PCI CaaS service? a) FedCloud b) ClearSoln c) Rackserve PCI d) All of the mentioned
Last Answer : ) Rackserve PCI

Show More

6 views 1 answer



________ as a Service is a hosted application that is the cloud equivalent of a traditional desktop application. a) Software b) Platform c) Analytics d) Compliance
Last Answer : Software

Show More

5 views 1 answer



Which of the following can be used for the banking industry? a) athenahealth b) bankserve c) bankingsol d) all of the mentioned
Last Answer : bankserve

Show More

2 views 1 answer



Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned
Last Answer : A Compliance as a Service application would need to serve as a trusted third party

Show More

6 views 1 answer



Which of the following is a man-in-the-middle type of service? a) CaaS b) IaaS c) AaaS d) All of the mentioned
Last Answer : CaaS

Show More

5 views 1 answer



Which of the following allows a distributed ID system to write and enforce custom policy expressions? a) XACML b) XML c) SOAP d) None of the mentioned
Last Answer : XACML

Show More

3 views 1 answer



Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned
Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable

Show More

7 views 1 answer



Which of the following is an example of a vertical cloud that advertise CaaS capabilities? a) FedCloud b) ClearPoint PCI c) Rackserve PCI d) All of the mentioned
Last Answer : All of the mentioned

Show More

6 views 1 answer



Which of the following should come in place of question mark for the following figure? a) Policy Enforcement Point b) Policy Decision Pointc) Policy Insertion Point d) All of the mentioned
Last Answer : Policy Decision Point

Show More

3 views 1 answer



Which of the following is authorization markup language? a) eXtensible Access Control Markup Language b) intrinsic Access Control Markup Language c) hypertext Access Control Markup Language d) all of the mentioned
Last Answer : eXtensible Access Control Markup Language

Show More

3 views 1 answer



The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service. a) Higgins b) Hughes c) Hinges d) All of the mentioned
Last Answer : Higgins

Show More

2 views 1 answer



Which of the following standard is concerned with the exchange and control of identity information? a) IGK b) IDF c) IGF d) All of the mentioned
Last Answer : IGF

Show More

3 views 1 answer



Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned
Last Answer : The OpenID and

Show More

4 views 1 answer



Which of the following allows a distributed ID system to write and enforce custom policy expressions? a) XACML b) XML c) SOAP d) None of the mentioned
Last Answer : XACML

Show More

3 views 1 answer



Point out the wrong statement. a) XML checks the ID request against its policies and either allows or denies the request b) SPML in most instances operates as a reply/request mechanism c) User centric authentication takes place usually in the form of knowledge cards d) All of the mentioned
Last Answer : SPML in most instances operates as a reply/request mechanism

Show More

2 views 1 answer



Any software application that complies with the standard accepts a _______ that is authenticated by a trusted provider. a) OpenID b) OpenUser c) OpenSSD d) None of the mentioned
Last Answer : OpenID

Show More

9 views 1 answer



Which of the following figure fully represent standards needed by IDaaS applications for interoperability? a) b) c) d)
Last Answer : a)

Show More

4 views 1 answer



Which of the following is provided by Identity as a Service? a) Identity governance b) Provisioning c) Risk and event monitoring d) All of the mentioned
Last Answer : All of the mentioned

Show More

5 views 1 answer



_________ is one of the more expensive and complex areas of network computing. a) Multi-Factor Authentication b) Fault tolerance c) Identity protection d) All of the mentioned
Last Answer : Identity protection

Show More

3 views 1 answer



________ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks. a) Internet Hardware Addresses b) Ethernet Software Addresses c) Ethernet Hardware Addresses d) None of the mentioned
Last Answer : Ethernet Hardware Addresses

Show More

4 views 1 answer



__________ authentication requires the outside use of a network security or trust service. a) SSO b) Singlefactor c) Multi Factor d) All of the mentioned
Last Answer : Multi Factor

Show More

6 views 1 answer



Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned
Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Show More

2 views 1 answer



Which of the following attribute should be unique? a) identity b) digital identity c) mashup d) all of the mentioned
Last Answer : digital identity

Show More

7 views 1 answer



Which of the following group is dedicated to support technologies that implement enterprise mashups? a) Open Alliance Apache b) Open Mashup Alliance c) Open Tech Alliance d) None of the mentioned
Last Answer : Open Mashup Alliance

Show More

3 views 1 answer



Point out the correct statement. a) Mashups are an incredibly useful hybrid Web application b)SaaS will eventually replace all locally installed software c) The establishment and proof of identity is a central network function d) All of the mentioned
Last Answer : All of the mentioned

Show More

3 views 1 answer



Salesforce.com is the largest ______ provider of CRM software. a) PaaS b) IaaS c) CaaS d) SaaS
Last Answer : SaaS

Show More

17 views 1 answer



The componentized nature of SaaS solutions enables many solutions to support a feature called _____________ a) workspace b) workloads c) mashups d) all of the mentioned
Last Answer : mashups

Show More

2 views 1 answer



Open source software used in a SaaS is called _______ SaaS. a) closed b) free c) open d) all of the mentioned
Last Answer : open

Show More

17 views 1 answer



SaaS supports multiple users and provides a shared data model through _________ model. a) single-tenancy b) multi-tenancy c) multiple-instance d) all of the mentioned
Last Answer : multi-tenancy

Show More

5 views 1 answer



_________ applications have a much lower barrier to entry than their locally installed competitors. a) IaaS b) CaaS c) PaaS d) None of the mentioned
Last Answer : None of the mentioned

Show More

5 views 1 answer



Which of the following is a SaaS characteristic? a) The typical license is subscription-based or usage-based and is billed on a recurring basis b) The software is available over the Internet ... The software and the service are monitored and maintained by the vendor d) All of the mentioned
Last Answer : All of the mentioned

Show More

1 view 1 answer



Point out the wrong statement. a) SaaS applications come in all shapes and sizes b) Every computer user is familiar with SaaS systems c) SaaS software is not customizable d) None of the mentioned
Last Answer : None of the mentioned

Show More

6 views 1 answer



Which of the following SaaS platform is with an exposed API? a) salesforce.com b) amazon.com c) flipkart.com d) all of the mentioned
Last Answer : salesforce.com

Show More

8 views 1 answer



Which of the following aspect of the service is abstracted away? a) Data escrow b) User Interaction c) Adoption drivers d) None of the mentioned
Last Answer : User

Show More

1 view 1 answer



Point out the correct statement. a) Platforms can be based on specific types of development languages, application frameworks, or other constructs b) SaaS is the cloud-based equivalent of shrink- ... succinctly described as software that is deployed on a hosted service d) All of the mentioned
Last Answer : All of the mentioned

Show More

27 views 1 answer



Which of the following is the most complete cloud computing service model? a) PaaS b) IaaS c) CaaS d) SaaS
Last Answer : SaaS

Show More

25 views 1 answer



Rackspace Cloud Service is an example of _____________ a) IaaS b) SaaS c) PaaS d) All of the mentioned
Last Answer : IaaS

Show More

4 views 1 answer



Amazon Web Services offers a classic Service Oriented Architecture (SOA) approach to ______________ a) IaaS b) SaaS c) PaaS d) All of the mentioned
Last Answer : PaaS

Show More

87 views 1 answer



_______ provides virtual machines, virtual storage, virtual infrastructure, and other hardware assets. a) IaaS b) SaaS c) PaaS d) All of the mentioned
Last Answer : IaaS

Show More

42 views 1 answer



__________ is the most refined and restrictive service model. a) IaaS b) CaaS c) PaaS d) All of the mentioned
Last Answer : PaaS

Show More

6 views 1 answer