Download PDF
Free download in PDF Cloud programming Multiple Choice Questions(MCQs) & Answers. These multiple choice questions on Computer Science are very useful for NIELIT, BCA, B.Sc. MCA, M.Sc. B.Tech, M.Tech, BE, ME students an interview for various positions like Web Developer, System Analyst etc.
581
Choice a correct answer which is not an OASIS standard for SOA Security?
[A]
Synchronized Multimedia Integration Language
[B]
WS-SecureConversion
[C]
Security Assertion Markup Language
[D]
all of the mentioned
Answer: Synchronized Multimedia Integration Language
582
Which of the following provides data authentication and authorization between client and service?
[A]
WS-SecureConversion
[B]
WS-Security
[C]
SAML
[D]
All of the mentioned
583
Point out the wrong statement.
[A]
WS-SecureConversion attaches a security context token to communications such as SOAP used to transport messages in an SOA enterprise
[B]
WS-Trust is an extension of SOA that enforces security by applying tokens such as Kerberos, SAML, or X.509 to messages
[C]
To address SOA security, a set of OASIS standards have been created
[D]
None of the mentioned
Answer: WS-Trust is an extension of SOA that enforces security by applying tokens such as Kerberos, SAML, or X.509 to messages
584
____________ is a web services protocol for creating and sharing security context?
[A]
WS-SecureConversion
[B]
WS-SecurityPolicy
[C]
WS-Trust
[D]
all of the mentioned
Answer: WS-SecureConversion
585
Which of the following is part of a general WS-Policy framework?
[A]
WS-SecurityPolicy
[B]
WS-Trust
[C]
WS-SecureConversion
[D]
All of the mentioned
Answer: WS-SecurityPolicy
586
Which of the following extends WS-Security to provide a mechanism to issue, renew, and validate security tokens?
[A]
WS-Trust
[B]
WS-SecurityPolicy
[C]
WS-SecureConversion
[D]
All of the mentioned
587
Which of the following is a mechanism for attaching security tokens to messages.
[A]
SAS
[B]
STT
[C]
STS
[D]
All of the mentioned
588
Providing XML Gateway SOA security requires a _________ so that encryption is enforced by digital signatures.
[A]
Hybrid Key Infrastructure
[B]
Public Key Infrastructure
[C]
Private Key Infrastructure
[D]
None of the mentioned
Answer: Public Key Infrastructure
589
____________ organization supports the development of standards for cloud computing?
[A]
OCP
[B]
OPC
[C]
OCC
[D]
All of the mentioned
590
Point out the wrong statement.
[A]
The Apache Hadoop open-source system is based on MapReduce and GFS
[B]
MapReduce is Google’s patented software framework that supports distributed large data sets organized by the Google File System
[C]
MapReduce is Yahoo’s patented software framework that supports distributed large data sets organized by the Yahoo File Syste
[D]
None of the mentioned
Answer: MapReduce is Yahoo’s patented software framework that supports distributed large data sets organized by the Yahoo File System
591
Which of the following function is provided by OCC working group?
[A]
Support the development of open-source reference implementations for cloud computing
[B]
Cloud computing relies on a set of protocols needed to manage interprocess communications
[C]
Develop benchmarks for measuring cloud computing performance
[D]
All of the mentioned
Answer: All of the mentioned
592
OCC supports the management of cloud computing infrastructure for scientific research as part of the ________ working group initiative.
[A]
OSCDP
[B]
OSCP
[C]
OSCD
[D]
all of the mentioned
View Answer
593
Point out the correct statement.
[A]
SOA offers an architectural blueprint for accessing diverse optimized services through a tightly coupled standardized method
[B]
SOA offers an architectural blueprint for accessing diverse optimized services through a loosely coupled standardized metho
[C]
OCC does not support the development of open-source reference implementations for cloud computing
[D]
None of the mentioned
View Answer
Answer: SOA offers an architectural blueprint for accessing diverse optimized services through a loosely coupled standardized method
594
Which of the following is single-purpose application implemented in the cloud?
[A]
Twitter’s Instant Messaging
[B]
Carbonite backup
[C]
Google’s Gmail email
[D]
All of the mentioned
View Answer
Answer: All of the mentioned
595
Which of the following is used to describe Web services that allow for user input and modification?
[A]
Web 3.0
[B]
Web 2.0
[C]
Web 1.0
[D]
All of the mentioned
596
A _____ is the combination of data from two or more sources that creates a unique service.
[A]
mashup
[B]
ajax
[C]
dev
[D]
all of the mentioned
597
Which of the following correctly describes group of technologies that leverage HTML and CSS for styling?
[A]
AJAX
[B]
SAS
[C]
DOM
[D]
All of the mentioned
598
AJAX uses _________ for asynchronous communication between various data sources.
[A]
XMLHttpRequest
[B]
DTD
[C]
XSLT
[D]
None of the mentioned
599
The properties necessary to guarantee a reliable transaction in databases and other applications is referred to as _____________
[A]
ATOM
[B]
BASE
[C]
ACID
[D]
All of the mentioned
600
Point out the wrong statement.
[A]
The location of an application or service plays a fundamental role in how the application must be written
[B]
An application or process that runs on a desktop or server is executed coherently, as a unit,under the control of an integrated program
[C]
In theory, any application can run either completely or partially in the cloud
[D]
None of the mentioned
Answer: None of the mentioned
Please share this page