Multiple choice Questions and Answers on IDaaS of Cloud Computing for Freshers

1. Salesforce.com is the largest ______ provider of CRM software. a) PaaS b) IaaS c) CaaS d) SaaS Answer: d Explanation: Salesforce....

1. Salesforce.com is the largest ______ provider of CRM software.

a) PaaS
b) IaaS
c) CaaS
d) SaaS
Answer: d

Explanation: Salesforce.com extended its SaaS offering to allow developers to create add-on applications.
2. Point out the correct statement :

a) Mashups are an incredibly useful hybrid Web application
b) SaaS will eventually replace all locally installed software
c) The establishment and proof of an identity is a central network function
d) All of the mentioned
Answer: d

Explanation: An identity service is one that stores the information associated with a digital entity in a form that can be queried and managed for use in electronic transactions.
3. Which of the following group is dedicated to support technologies that implement enterprise mashups ?

a) Open Alliance Apache
b) Open Mashup Alliance
c) Open Tech Alliance
d) None of the mentioned
Answer: b

Explanation: This group predicts that the use of mashups will grow by a factor of 10 within just a few years.
4. Which of the following attribute should be unique ?

a) identity
b) digital identity
c) mashup
d) all of the mentioned
Answer: b

Explanation: A digital identity is those attributes and metadata of an object along with a set of relationships with other objects that makes an object identifiable.
5. Point out the wrong statement :

a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems
b) Services that provide digital identity management as a service have been part of internetworked systems from Day One
c) IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses
d) None of the mentioned
Answer: c

Explanation: The name servers that run the various Internet domains are IDaaS servers.
6. __________ authentication requires the outside use of a network security or trust service

a) SSO
b) Singlefactor
c) Multi Factor
d) All of the mentioned
Answer: c

Explanation: More secure authentication requires the use of at least two-factor authentication.
7. ________ is assignment of a network identity to a specific MAC address that allows systems to be found on networks.

a) Internet Hardware Addresses
b) Ethernet Software Addresses
c) Ethernet Hardware Addresses
d) None of the mentioned
Answer: c

Explanation: Network interfaces are identified uniquely by Media Access Control (MAC) addresses, which alternatively are referred to as Ethernet Hardware Addresses.
8. _________ is one of the more expensive and complex areas of network computing.

a) Multi-Factor Authentication
b) Fault tolerance
c) Identity protection
d) All of the mentioned
Answer: c

Explanation: Ticket or token providing services, certificate servers, and other trust mechanisms all provide identity services that can be pushed out of private networks and into the cloud.
9. Which of the following is provided by Identity as a Service ?

a) Identity governance
b) Provisioning
c) Risk and event monitoring
d) All of the mentioned
Answer: d

Explanation: Identity as a Service or the related hosted (managed) identity services may be the most valuable and cost effective distributed service types you can subscribe to.
10. Which of the following figure fully represent standards needed by IDaaS applications for interoperability ?

a)cloud-computing-idaas-interview-questions-answers-q10a
b)cloud-computing-idaas-interview-questions-answers-q10b
c)cloud-computing-idaas-interview-questions-answers-q10c
d)cloud-computing-idaas-interview-questions-answers-q10d
Answer: a

Explanation: Cloud computing IDaaS applications must rely on a set of developing industry standards to provide interoperability.
11. Any software application that complies with the standard accepts an _______ that is authenticated by a trusted provider.

a) OpenID
b) OpenUser
c) OpenSSD
d) None of the mentioned
Answer: a

Explanation: When an identity is created in an OpenID system, that information is stored in the system of any OpenID service provider and translated into a unique identifier.
12. Point out the wrong statement :

a) XML checks the ID request against its policies and either allows or denies the request
b) SPML in most instances operates as a reply/request mechanism
c) User centric authentication takes place usually in the form of knowledge cards
d) All of the mentioned
Answer: b

Explanation: In SAML, a service provider passes a statement or set of statements (called assertions) to an identity provider that must be evaluated.
13. Which of the following allows a distributed ID system to write and enforce custom policy expressions ?

a) XACML
b) XML
c) SOAP
d) None of the mentioned
Answer: a

Explanation: This is a general-purpose authorization policy language.
14. _________ is a standard of OASIS’s PSTC that conforms to the SOA architecture.

a) XACML
b) SPML
c) SML
d) All of the mentioned
Answer: b

Explanation: SPML is an XML request/response language that is used to integrate and interoperate service provisioning requests.
15. Point out the wrong statement :

a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems
b) The Distributed Audit Service provides accountability for users accessing a system
c) The OpenID and CardSpace specifications support authentication type of data object
d) None of the mentioned
Answer: c

Explanation: OpenID is a developing industry standard for authenticating “end users” by storing their digital identity in a common format.
16. Which of the following standard is concerned with the exchange and control of identity information ?

a) IGK
b) IDF
c) IGF
d) All of the mentioned
Answer: c

Explanation: The Identity Governance Framework (IGF) is a standards initiative of the Liberty Alliance.
17. _______ is a Microsoft software client that is part of the company’s Identity Metasystem and built into the Web Services Protocol Stack.

a) IHA
b) EHA
c) CardSpace
d) None of the mentioned
Answer: c

Explanation: CardSpace was introduced with .NET Frameworks 3.0 and can be installed on Windows XP, Server 2003, and later.
18. The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service.

a) Higgins
b) Hughes
c) Hinges
d) All of the mentioned
Answer: a

Explanation: The Higgins Open Source Identity Framework uses an i-Card metaphor.
19. Which of the following is authorization markup language ?

a) eXtensible Access Control Markup Language
b) intrinsic Access Control Markup Language
c) hypertext Access Control Markup Language
d) all of the mentioned
Answer: a

Explanation: A policy in XACML describes a subject element that requests an action from a resource.
20. Which of the following should come in place of question mark for the following figure ?

cloud-computing-interview-questions-answers-experienced-q10
a) Policy Enforcement Point
b) Policy Decision Point
c) Policy Insertion Point
d) All of the mentioned
Answer: b

Explanation: SAML integrates with XACML to implement a policy engine in a Service Oriented Architecture to support identity services authorization.

Related

Multiple Choice Questions 4288945709125103855

Post a Comment

emo-but-icon

item