MCQOPTIONS
Saved Bookmarks
This section includes 1361 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
| 951. |
Which of the following is a collaborative effort where the logic of the business process is pushed out to the members ? |
| A. | Orchestration |
| B. | Choreography |
| C. | SOA 2.0 |
| D. | None of the mentioned |
| Answer» C. SOA 2.0 | |
| 952. |
What does CVE in SOA design stands for ? |
| A. | Causal Vector Engine |
| B. | Continuous Vector Engine |
| C. | Causal Valuable Engine |
| D. | None of the mentioned |
| Answer» B. Continuous Vector Engine | |
| 953. |
Which of the following application has ability to query event data in the same way that a stock ticker or trading application can query trading data ? |
| A. | CVE |
| B. | CEV |
| C. | XML |
| D. | None of the mentioned |
| Answer» B. CEV | |
| 954. |
SOA _____ an extension of the Service Oriented Architecture to respond to events that occur as a result of business processes. |
| A. | 2.0 |
| B. | 3.0 |
| C. | 4.0 |
| D. | All of the mentioned |
| Answer» B. 3.0 | |
| 955. |
Which of the following element is used by orchestrated business process commonly referred as ? |
| A. | conductor |
| B. | coordinator |
| C. | orchestrator |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 956. |
Which of the following provides commands for defining logic using conditional statements ? |
| A. | XML |
| B. | WS-BPEL |
| C. | JSON |
| D. | None of the mentioned |
| Answer» C. JSON | |
| 957. |
Which of the following is commonly used to describe the service interface, how to bind information, and the nature of the component’s service or endpoint ? |
| A. | WSDL |
| B. | SCDL |
| C. | XML |
| D. | None of the mentioned |
| Answer» B. SCDL | |
| 958. |
Which of the following is used to define the service component that performs the service ? |
| A. | WSDL |
| B. | SCDL |
| C. | XML |
| D. | None of the mentioned |
| Answer» C. XML | |
| 959. |
Which of the following is a repeatable task within a business process ? |
| A. | service |
| B. | bus |
| C. | methods |
| D. | all of the mentioned |
| Answer» B. bus | |
| 960. |
Which of the following describes a message-passing taxonomy for a component-based architecture that provides services to clients upon demand ? |
| A. | SOA |
| B. | EBS |
| C. | GEC |
| D. | All of the mentioned |
| Answer» B. EBS | |
| 961. |
__________ allows users to authenticate their access to applications both locally and in the cloud with a claims-based identity. |
| A. | AD FS |
| B. | AC |
| C. | SAS |
| D. | None of the mentioned |
| Answer» B. AC | |
| 962. |
Which of the following foundation offers .NET developers Visual Studio integration of WS-Federation and WS-Trust open standards ? |
| A. | Windows Wor kflow |
| B. | Windows Identity |
| C. | Windows compliance |
| D. | None of the mentioned |
| Answer» C. Windows compliance | |
| 963. |
Which of the following provides a token service that can be used to present validated access to resources ? |
| A. | OAuth |
| B. | OCheck |
| C. | SAML |
| D. | None of the mentioned |
| Answer» B. OCheck | |
| 964. |
Which of the following entity queries the OpenID identity provider to authenticate the veracity of the OpenID credentials ? |
| A. | serving party |
| B. | relieving party |
| C. | relaying party |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 965. |
Which of the following is a complementary mechanism to OpenID and is used to create SSO systems ? |
| A. | OpenSSL |
| B. | CHAP |
| C. | SMAL |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 966. |
Which of the following standard is the key to creating Single Sign-On (SSO) systems ? |
| A. | OpenID 2.0 |
| B. | CHAP |
| C. | SMAL |
| D. | None of the mentioned |
| Answer» B. CHAP | |
| 967. |
Which of the following is required by Cloud Computing ? |
| A. | That you establish an identity |
| B. | That the identity be authenticated |
| C. | That the authentication be portable |
| D. | All of the mentioned |
| Answer» E. | |
| 968. |
Which of the following is done by Identity management ? |
| A. | controlling access to data in the cloud |
| B. | maintaining user roles |
| C. | preventing unauthorized uses |
| D. | all of the mentioned |
| Answer» E. | |
| 969. |
Amazon Web Services supports ________ Type II Audits. |
| A. | SAS70 |
| B. | SAS20 |
| C. | SAS702 |
| D. | None of the mentioned |
| Answer» B. SAS20 | |
| 970. |
Which of the following is one of the most actively developing and important areas of cloud computing technology? |
| A. | Logging |
| B. | Auditing |
| C. | Regulatory compliance |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 971. |
Which of the following was one of the weaker aspects of early cloud computing service offerings? |
| A. | Logging |
| B. | Integrity checking |
| C. | Consistency checking |
| D. | None of the mentioned |
| Answer» B. Integrity checking | |
| 972. |
Which of the following is the standard for interoperable cloud-based key management? |
| A. | KMIP |
| B. | PMIK |
| C. | AIMK |
| D. | None of the mentioned |
| Answer» B. PMIK | |
| 973. |
Which of the following is a common means for losing encrypted data? |
| A. | lose the keys |
| B. | lose the encryption standard |
| C. | lose the account |
| D. | all of the mentioned |
| Answer» B. lose the encryption standard | |
| 974. |
How many security accounts per client is provided by Microsoft? |
| A. | 1 |
| B. | 3 |
| C. | 5 |
| D. | 7 |
| Answer» D. 7 | |
| 975. |
Which of the following is key mechanism for protecting data? |
| A. | Access control |
| B. | Auditing |
| C. | Authentication |
| D. | All of the mentioned |
| Answer» E. | |
| 976. |
Which of the following is a compliance standard? |
| A. | PCI-DSS |
| B. | HIPPA |
| C. | GLBA |
| D. | All of the mentioned |
| Answer» E. | |
| 977. |
Which of the following has infrastructure security managed and owned by vendor ? |
| A. | Hybrid |
| B. | Private/Community |
| C. | Public |
| D. | None of the mentioned |
| Answer» C. Public | |
| 978. |
Which of the following model type is not trusted in terms of security ? |
| A. | Public |
| B. | Private |
| C. | Hybrid |
| D. | None of the mentioned |
| Answer» B. Private | |
| 979. |
Which of the following service model is owned in terms of infrastructure by both vendor and customer ? |
| A. | Public |
| B. | Private |
| C. | Hybrid |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 980. |
Which of the following cloud does not require mapping ? |
| A. | Public |
| B. | Private |
| C. | Hybrid |
| D. | None of the mentioned |
| Answer» B. Private | |
| 981. |
Which of the following model allows vendor to provide security as part of the Service Level Agreement ? |
| A. | SaaS |
| B. | PaaS |
| C. | IaaS |
| D. | All of the mentioned |
| Answer» B. PaaS | |
| 982. |
For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer. |
| A. | SaaS |
| B. | PaaS |
| C. | IaaS |
| D. | All of the mentioned |
| Answer» C. IaaS | |
| 983. |
Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model ? |
| A. | CAS |
| B. | CSA |
| C. | SAC |
| D. | All of the mentioned |
| Answer» C. SAC | |
| 984. |
Which of the following service provider provides the highest level of service ? |
| A. | SaaS |
| B. | PaaS |
| C. | IaaS |
| D. | All of the mentioned |
| Answer» B. PaaS | |
| 985. |
Which of the following is application and infrastructure management software for hybrid multi-clouds ? |
| A. | VMware Hyperic |
| B. | Webmetrics |
| C. | Univa UD |
| D. | Tapinsystems |
| Answer» D. Tapinsystems | |
| 986. |
Which of the following is used for Web performance management and load testing ? |
| A. | VMware Hyperic |
| B. | Webmetrics |
| C. | Univa UD |
| D. | Tapinsystems |
| Answer» C. Univa UD | |
| 987. |
Which of the following is considered an essential element in cloud computing by CSA ? |
| A. | Multi-tenancy |
| B. | Identity and access management |
| C. | Virtualization |
| D. | All of the mentioned |
| Answer» B. Identity and access management | |
| 988. |
Which of the following is operational domain of CSA ? |
| A. | Scalability |
| B. | Portability and interoperability |
| C. | Flexibility |
| D. | None of the mentioned |
| Answer» C. Flexibility | |
| 989. |
Which of the following area of cloud computing is uniquely troublesome ? |
| A. | Auditing |
| B. | Data integrity |
| C. | e-Discovery for legal compliance |
| D. | All of the mentioned |
| Answer» E. | |
| 990. |
Which of the following services that need to be negotiated in Service Level Agreements ? |
| A. | Logging |
| B. | Auditing |
| C. | Regulatory compliance |
| D. | All of the mentioned |
| Answer» E. | |
| 991. |
Which of the following service provider provides the least amount of built in security ? |
| A. | SaaS |
| B. | PaaS |
| C. | IaaS |
| D. | All of the mentioned |
| Answer» D. All of the mentioned | |
| 992. |
Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons ? |
| A. | CloudWatch |
| B. | CloudSensor |
| C. | CloudMetrics |
| D. | All of the mentioned |
| Answer» C. CloudMetrics | |
| 993. |
Which of the following is a workflow control and policy based automation service by CA ? |
| A. | CA Cloud Optimize |
| B. | CA Cloud Orchestrate |
| C. | CA Cloud Insight |
| D. | CA Cloud Compose |
| Answer» C. CA Cloud Insight | |
| 994. |
Which of the following is open and both hypervisor and processor-architecture-agnostic ? |
| A. | Dell Scalent |
| B. | CloudKick |
| C. | Elastra |
| D. | All of the mentioned |
| Answer» B. CloudKick | |
| 995. |
Which of the following initiative tries to provide a way of measuring cloud computing services along dimension like cost ? |
| A. | CCE |
| B. | OCCI |
| C. | SMI |
| D. | All of the mentioned |
| Answer» D. All of the mentioned | |
| 996. |
Which of the following is an industry organization that develops industry system management standards for platform interoperability ? |
| A. | DMTF |
| B. | DMS |
| C. | EBS |
| D. | All of the mentioned |
| Answer» B. DMS | |
| 997. |
Which of the following is a core management feature offered by most cloud management service products ? |
| A. | Support of different cloud types |
| B. | Creation and provisioning of different types of cloud resources, such as machine instances, storage, or staged applications |
| C. | Performance reporting including availability and uptime, response time, resource quota usage, and other characteristics |
| D. | All of the mentioned |
| Answer» E. | |
| 998. |
Which of the following is used for performance management for virtualized Java Apps with VMware integration ? |
| A. | Hyperic |
| B. | Internetseer |
| C. | RightScale |
| D. | All of the mentioned |
| Answer» B. Internetseer | |
| 999. |
Which of the following is used for Web site monitoring and analytics ? |
| A. | Gomez |
| B. | Ganglia |
| C. | Elastra |
| D. | None of the mentioned |
| Answer» B. Ganglia | |
| 1000. |
Which of the following is a virtualization provisioning system that will be rolled into Dell’s AIM ? |
| A. | Dell Scalent |
| B. | CloudKick |
| C. | Elastra |
| D. | All of the mentioned |
| Answer» B. CloudKick | |