Point out the correct statement.
1.Different types of cloud computing service models provide different levels of security services
2. Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
3.Data should be transferred and stored in an encrypted format for security purpose
4. All of the mentioned
Posted Date:-2021-12-17 00:50:15
Point out the wrong statement.
1.Event handling is part of event-driven SOA or SOA 2.0
2.An ESB provides a lower layer for event management with a messaging infrastructure
3.UML is the modeling language of the Object Management Group that provides a method for creating visual models for software
4. None of the mentioned
Posted Date:-2021-12-18 03:27:01
Which of the following application has the ability to query event data in the same way that a stock ticker or trading application can query trading data?
1.CVE
2. CEV
3.XML
4.none of the mentioned
Posted Date:-2021-12-18 03:49:41
Which of the following cloud does not require mapping?
1.Public
2.Private
3.Private
4.none of the mentioned
Posted Date:-2021-12-17 00:56:11
Which of the following element is used by orchestrated business process commonly referred to as?
1. conductor
2.coordinator
3.orchestrator
4.all of the mentioned
Posted Date:-2021-12-18 03:25:30
Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?
1.CAS
2.CSA
3.SAC
4.all of the mentioned
Posted Date:-2021-12-17 00:54:53
Which of the following service provider provides the highest level of service?
1.SaaS
2.PaaS
3.IaaS
4. All of the mentioned
Posted Date:-2021-12-17 00:54:20
Which of the following was one of the weaker aspects of early cloud computing service offerings?
1. Logging
2.Integrity checking
3.Consistency checking
4.none of the mentioned
Posted Date:-2021-12-18 02:53:01
_____ allows users to authenticate their access to applications both locally and in the cloud with a claims-based identity.
1.AD FS
2.AC
3. SAS
4.none of the mentioned
Posted Date:-2021-12-18 03:18:44
Amazon Web Services supports ________ Type II Audits.
1.SAS70
2.SAS20
3.SAS702
4.none of the mentioned
Posted Date:-2021-12-18 02:54:54
For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer.
1.SaaS
2.PaaS
3. IaaS
4. All of the mentioned
Posted Date:-2021-12-17 00:55:19
How many different protocol types are required for message passing in SOA?
1.1
2.2
3.3
4.4
Posted Date:-2021-12-18 04:01:19
How many types of methods are used to combine web services?
1.1
2.2
3.3
4.none of the mentioned
Posted Date:-2021-12-18 03:51:56
In the ______ model, data and messages are exchanged in a Service Data Object (SDO).
1.CSA
2.SCA
3.UDDI
4.none of the mentioned
Posted Date:-2021-12-18 03:51:33
SOA _____ an extension of the Service Oriented Architecture to respond to events that occur as a result of business processes.
1.2.0
2.3.0
3. 4.0
4.all of the mentioned
Posted Date:-2021-12-18 03:26:09
What does CVE in SOA design stand for?
1.Causal Vector Engine
2. Continuous Vector Engine
3.Causal Valuable Engine
4. None of the mentioned
Posted Date:-2021-12-18 03:50:26
Which of the following are a common means for losing encrypted data?
1. lose the keys
2. lose the encryption standard
3. lose the account
4.all of the mentioned
Posted Date:-2021-12-18 02:51:03
Which of the following area of cloud computing is uniquely troublesome?
1.Auditing
2. Data integrity
3. e-Discovery for legal compliance
4.all of the mentioned
Posted Date:-2021-12-17 00:51:37
Which of the following catalog service requires some sort of synchronization or update to maintain a unified data store across the servers involved?
1. global
2. standalone
3.federated
4.all of the mentioned
Posted Date:-2021-12-18 04:00:35
Which of the following combination is possible in WebSphere ESB?
1. XML/JMS
2. SOAP/JMS
3.SOAP/HTTP
4. Governance
Posted Date:-2021-12-18 04:02:35
Which of the following describes a message-passing taxonomy for a component-based architecture that provides services to clients upon demand?
1. SOA
2. EBS
3.GEC
4.all of the mentioned
Posted Date:-2021-12-18 03:20:19
Which of the following entity queries the OpenID identity provider to authenticate the veracity of the OpenID credentials?
1. serving party
2. relieving party
3.relaying party
4.none of the mentioned
Posted Date:-2021-12-18 03:01:20
Which of the following essential object in WSDL is used to support message transfer?
1.bus
2. binding
3. type
4.none of the mentioned
Posted Date:-2021-12-18 04:05:10
Which of the following foundation offers .NET developers Visual Studio integration of WS-Federation and WS-Trust open standards?
1.Windows Workflow
2.Windows Identity
3.Windows compliance
4.none of the mentioned
Posted Date:-2021-12-18 03:17:38
Which of the following function is performed by the service bus?
1.auditing
2. routing
3. message translation
4.all of the mentioned
Posted Date:-2021-12-18 03:54:20
Which of the following has infrastructure security managed and owned by the vendor?
1.Hybrid
2.Private/Community
3.Public
4.none of the mentioned
Posted Date:-2021-12-17 00:57:40
Which of the following is a collaborative effort where the logic of the business process is pushed out to the members?
1.Orchestration
2.Choreography
3.SOA 2.0
4.none of the mentioned
Posted Date:-2021-12-18 03:51:01
Which of the following is a complementary mechanism to OpenID and is used to create SSO systems?
1.OpenSSL
2. CHAP
3.SMAL
4. None of the mentioned
Posted Date:-2021-12-18 02:59:49
Which of the following is a compliance standard?
1.PCI-DSS
2.HIPPA
3.GLBA
4.all of the mentioned
Posted Date:-2021-12-17 00:58:28
Which of the following is a key mechanism for protecting data?
1.Access control
2.Auditing
3.Authentication
4.all of the mentioned
Posted Date:-2021-12-17 00:58:59
Which of the following is a repeatable task within a business process?
1.service
2. bus
3.methods
4.all of the mentioned
Posted Date:-2021-12-18 03:21:24
Which of the following is an ESB based on open standards such as Java EE?
1. InfoSphere ESB 7.0
2. WebSphere ESB 7.0
3. CloudSphere ESB 7.0
4.All of the mentioned
Posted Date:-2021-12-18 03:55:18
Which of the following is application and infrastructure management software for hybrid multi-clouds?
1.VMware Hyperic
2.Webmetrics
3.Univa UD
4.Tapinsystems
Posted Date:-2021-12-17 00:53:29
Which of the following is commonly used to describe the service interface, how to bind information, and the nature of the component’s service or endpoint?
1. WSDL
2.SCDL
3.XML
4.none of the mentioned
Posted Date:-2021-12-18 03:23:21
Which of the following is considered an essential element in cloud computing by CSA?
1.Multi-tenancy
2. Identity and access management
3.Virtualization
4.all of the mentioned
Posted Date:-2021-12-17 00:52:31
Which of the following is done by Identity management?
1.controlling access to data in the cloud
2. maintaining user roles
3.preventing unauthorized uses
4.all of the mentioned
Posted Date:-2021-12-18 02:56:15
Which of the following is one of the most actively developing and important areas of cloud computing technology?
1. Logging
2.Auditing
3.Regulatory compliance
4.none of the mentioned
Posted Date:-2021-12-18 02:54:00
Which of the following is required by Cloud Computing?
1. That you establish an identity
2.That the identity be authenticated
3.That the authentication be portable
4.all of the mentioned
Posted Date:-2021-12-18 02:57:03
Which of the following is the language standard for Web service interactions?
1.WS-BPEL
2.WS-XML
3.WS-JSON
4.all of the mentioned
Posted Date:-2021-12-18 04:06:47
Which of the following is the operational domain of CSA?
1.Scalability
2. Portability and interoperability
3. Flexibility
4.none of the mentioned
Posted Date:-2021-12-17 00:52:06
Which of the following is the standard for interoperable cloud-based key management?
1. KMIP
2.PMIK
3.AIMK
4. None of the mentioned
Posted Date:-2021-12-18 02:51:59
Which of the following is used for Web performance management and load testing?
1. VMware Hyperic
2.Webmetrics
3.Univa UD
4. Tapinsystems
Posted Date:-2021-12-17 00:53:02
Which of the following is used to aid for locating services in SOA?
1. catalog service
2. data abstraction services
3.data bus
4.all of the mentioned
Posted Date:-2021-12-18 03:59:21
Which of the following is used to define the service component that performs the service?
1.WSDL
2. SCDL
3.XML
4.none of the mentioned
Posted Date:-2021-12-18 03:22:25
Which of the following manage message transactions?
1.Data abstraction services
2.Process management services
3.Data repositories
4.Governance
Posted Date:-2021-12-18 03:56:15
Which of the following messaging protocol is used with XML in BPEL?
1.WS-Coordination
2.WS-Addressing
3.WS-Transactions
4.all of the mentioned
Posted Date:-2021-12-18 04:07:30
Which of the following model allows vendor to provide security as part of the Service Level Agreement?
1. SaaS
2.PaaS
3.IaaS
4.all of the mentioned
Posted Date:-2021-12-17 00:55:46
Which of the following model type is not trusted in terms of security?
1. Public
2. Private
3.Hybrid
4.none of the mentioned
Posted Date:-2021-12-17 00:57:13
Which of the following object is used to describe the data, usually as part of the XML schema?
1.operation
2. prototype
3. types
4.none of the mentioned
Posted Date:-2021-12-18 04:05:42
Which of the following provides a token service that can be used to present validated access to resources?
1. OAuth
2. OCheck
3.SAML
4.none of the mentioned
Posted Date:-2021-12-18 03:12:10
Which of the following provides commands for defining logic using conditional statements?
1.XML
2.WS-BPEL
3. JSON
4.none of the mentioned
Posted Date:-2021-12-18 03:24:21
Which of the following service model is owned in terms of infrastructure by both vendor and customer?
1.Public
2. Private
3. Hybrid
4. None of the mentioned
Posted Date:-2021-12-17 00:56:40
Which of the following service provider provides the least amount of built in security?
1.SaaS
2.PaaS
3.IaaS
4.all of the mentioned
Posted Date:-2021-12-17 00:49:44
Which of the following services that need to be negotiated in Service Level Agreements?
1.Logging
2. Auditing
3. Regulatory compliance
4.all of the mentioned
Posted Date:-2021-12-17 00:50:54
Which of the following standard is the key to creating Single Sign-On (SSO) systems?
1. OpenID 2.0
2.CHAP
3. SMAL
4.none of the mentioned
Posted Date:-2021-12-18 02:57:51
Which of the following statement is incorrect related to a repository and a registry in ESB?
1.Repositories and registries are both data stores
2.Repository stores references to the components of the SOA
3.A registry serves the role that a name server does in a network operating system infrastructure
4.none of the mentioned
Posted Date:-2021-12-18 03:57:33
Which of the following statement is incorrect related to BPEL?
1. Data functions in BPEL support process data and control flow
2. BPEL includes techniques for error handling and scopes transactions
3.BPEL uses Web services for standards and to assemble and decompose processes
4.None of the mentioned
Posted Date:-2021-12-18 04:09:45
Which of the following statement is incorrect related to catalog servers?
1.They can be standalone catalog servers serving a single site
2. They cannot serve the role of a global catalog service where two or more catalog servers are merged to include several sites
3. They can be part of a federated catalog service
4.None of the mentioned
Posted Date:-2021-12-18 04:03:39
Which of the following stores business logic and aid in governance of business processes?
1. Data abstraction services
2. Process management services
3.Data repositories
4.Governance
Posted Date:-2021-12-18 03:58:24
Which of the following version of WSDL is a W3C standard?
1. 1.1
2.2.3
3. 3.1
4.Governance
Posted Date:-2021-12-18 04:04:30