Cloud Computing Questions and Answers Part-14

1. Point out the correct statement.
a) Mashups are an incredibly useful hybrid Web application
b) SaaS will eventually replace all locally installed software
c) The establishment and proof of identity is a central network function
d) All of the mentioned

Answer: d
Explanation: An identity service is one that stores the information associated with a digital entity in a form that can be queried and managed for use in electronic transactions.

2. Which of the following group is dedicated to support technologies that implement enterprise mashups?
a) Open Alliance Apache
b) Open Mashup Alliance
c) Open Tech Alliance
d) None of the mentioned

Answer: b
Explanation: This group predicts that the use of mashups will grow by a factor of 10 within just a few years.

3. Which of the following attribute should be unique?
a) identity
b) digital identity
c) mashup
d) all of the mentioned

Answer: b
Explanation: A digital identity is those attributes and metadata of an object along with a set of relationships with other objects that makes an object identifiable.

4. Point out the wrong statement.
a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems
b) Services that provide digital identity management as a service have been part of internetworked systems from Day One
c) IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses
d) None of the mentioned

Answer: c
Explanation: The name servers that run the various Internet domains are IDaaS servers.

5. __________ authentication requires the outside use of a network security or trust service.
a) SSO
b) Singlefactor
c) Multi Factor
d) All of the mentioned

Answer: c
Explanation: More secure authentication requires the use of at least two-factor authentication.

6. ________ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks.
a) Internet Hardware Addresses
b) Ethernet Software Addresses
c) Ethernet Hardware Addresses
d) None of the mentioned

Answer: c
Explanation: Network interfaces are identified uniquely by Media Access Control (MAC) addresses, which alternatively are referred to as Ethernet Hardware Addresses.

7. _________ is one of the more expensive and complex areas of network computing.
a) Multi-Factor Authentication
b) Fault tolerance
c) Identity protection
d) All of the mentioned

Answer: c
Explanation: Ticket or token providing services, certificate servers, and other trust mechanisms all provide identity services that can be pushed out of private networks and into the cloud.

8. Which of the following is provided by Identity as a Service?
a) Identity governance
b) Provisioning
c) Risk and event monitoring
d) All of the mentioned

Answer: d
Explanation: Identity as a Service or the related hosted (managed) identity services may be the most valuable and cost effective distributed service types you can subscribe to.

9. Which of the following is an example of a vertical cloud that advertise CaaS capabilities?
a) FedCloud
b) ClearPoint PCI
c) Rackserve PCI
d) All of the mentioned

Answer: d
Explanation: It’s much easier to envisage a CaaS system built inside a private cloud where the data is under the control of a single entity.

10. Point out the wrong statement.
a) SPML is used to prepare Web services and applications for use
b) With SPML, a system can provide automated user and system access
c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable
d) All of the mentioned

Answer: c
Explanation: Without a provisioning system, a cloud computing system can be very inefficient and potentially unreliable.