Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following is a collaborative effort where the logic of the business process is pushed out to the members ?

A. Orchestration
B. Choreography
C. SOA 2.0
D. None of the mentioned
Answer» C. SOA 2.0
2.

What does CVE in SOA design stands for ?

A. Causal Vector Engine
B. Continuous Vector Engine
C. Causal Valuable Engine
D. None of the mentioned
Answer» B. Continuous Vector Engine
3.

Which of the following application has ability to query event data in the same way that a stock ticker or trading application can query trading data ?

A. CVE
B. CEV
C. XML
D. None of the mentioned
Answer» B. CEV
4.

SOA _____ an extension of the Service Oriented Architecture to respond to events that occur as a result of business processes.

A. 2.0
B. 3.0
C. 4.0
D. All of the mentioned
Answer» B. 3.0
5.

Which of the following element is used by orchestrated business process commonly referred as ?

A. conductor
B. coordinator
C. orchestrator
D. all of the mentioned
Answer» D. all of the mentioned
6.

Which of the following provides commands for defining logic using conditional statements ?

A. XML
B. WS-BPEL
C. JSON
D. None of the mentioned
Answer» C. JSON
7.

Which of the following is commonly used to describe the service interface, how to bind information, and the nature of the component’s service or endpoint ?

A. WSDL
B. SCDL
C. XML
D. None of the mentioned
Answer» B. SCDL
8.

Which of the following is used to define the service component that performs the service ?

A. WSDL
B. SCDL
C. XML
D. None of the mentioned
Answer» C. XML
9.

Which of the following is a repeatable task within a business process ?

A. service
B. bus
C. methods
D. all of the mentioned
Answer» B. bus
10.

Which of the following describes a message-passing taxonomy for a component-based architecture that provides services to clients upon demand ?

A. SOA
B. EBS
C. GEC
D. All of the mentioned
Answer» B. EBS
11.

__________ allows users to authenticate their access to applications both locally and in the cloud with a claims-based identity.

A. AD FS
B. AC
C. SAS
D. None of the mentioned
Answer» B. AC
12.

Which of the following foundation offers .NET developers Visual Studio integration of WS-Federation and WS-Trust open standards ?

A. Windows Wor kflow
B. Windows Identity
C. Windows compliance
D. None of the mentioned
Answer» C. Windows compliance
13.

Which of the following provides a token service that can be used to present validated access to resources ?

A. OAuth
B. OCheck
C. SAML
D. None of the mentioned
Answer» B. OCheck
14.

Which of the following entity queries the OpenID identity provider to authenticate the veracity of the OpenID credentials ?

A. serving party
B. relieving party
C. relaying party
D. none of the mentioned
Answer» D. none of the mentioned
15.

Which of the following is a complementary mechanism to OpenID and is used to create SSO systems ?

A. OpenSSL
B. CHAP
C. SMAL
D. None of the mentioned
Answer» D. None of the mentioned
16.

Which of the following standard is the key to creating Single Sign-On (SSO) systems ?

A. OpenID 2.0
B. CHAP
C. SMAL
D. None of the mentioned
Answer» B. CHAP
17.

Which of the following is required by Cloud Computing ?

A. That you establish an identity
B. That the identity be authenticated
C. That the authentication be portable
D. All of the mentioned
Answer» E.
18.

Which of the following is done by Identity management ?

A. controlling access to data in the cloud
B. maintaining user roles
C. preventing unauthorized uses
D. all of the mentioned
Answer» E.
19.

Amazon Web Services supports ________ Type II Audits.

A. SAS70
B. SAS20
C. SAS702
D. None of the mentioned
Answer» B. SAS20
20.

Which of the following is one of the most actively developing and important areas of cloud computing technology?

A. Logging
B. Auditing
C. Regulatory compliance
D. None of the mentioned
Answer» D. None of the mentioned
21.

Which of the following was one of the weaker aspects of early cloud computing service offerings?

A. Logging
B. Integrity checking
C. Consistency checking
D. None of the mentioned
Answer» B. Integrity checking
22.

Which of the following is the standard for interoperable cloud-based key management?

A. KMIP
B. PMIK
C. AIMK
D. None of the mentioned
Answer» B. PMIK
23.

Which of the following is a common means for losing encrypted data?

A. lose the keys
B. lose the encryption standard
C. lose the account
D. all of the mentioned
Answer» B. lose the encryption standard
24.

How many security accounts per client is provided by Microsoft?

A. 1
B. 3
C. 5
D. 7
Answer» D. 7
25.

Which of the following is key mechanism for protecting data?

A. Access control
B. Auditing
C. Authentication
D. All of the mentioned
Answer» E.
26.

Which of the following is a compliance standard?

A. PCI-DSS
B. HIPPA
C. GLBA
D. All of the mentioned
Answer» E.
27.

Which of the following has infrastructure security managed and owned by vendor ?

A. Hybrid
B. Private/Community
C. Public
D. None of the mentioned
Answer» C. Public
28.

Which of the following model type is not trusted in terms of security ?

A. Public
B. Private
C. Hybrid
D. None of the mentioned
Answer» B. Private
29.

Which of the following service model is owned in terms of infrastructure by both vendor and customer ?

A. Public
B. Private
C. Hybrid
D. None of the mentioned
Answer» D. None of the mentioned
30.

Which of the following cloud does not require mapping ?

A. Public
B. Private
C. Hybrid
D. None of the mentioned
Answer» B. Private
31.

Which of the following model allows vendor to provide security as part of the Service Level Agreement ?

A. SaaS
B. PaaS
C. IaaS
D. All of the mentioned
Answer» B. PaaS
32.

For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer.

A. SaaS
B. PaaS
C. IaaS
D. All of the mentioned
Answer» C. IaaS
33.

Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model ?

A. CAS
B. CSA
C. SAC
D. All of the mentioned
Answer» C. SAC
34.

Which of the following service provider provides the highest level of service ?

A. SaaS
B. PaaS
C. IaaS
D. All of the mentioned
Answer» B. PaaS
35.

Which of the following is application and infrastructure management software for hybrid multi-clouds ?

A. VMware Hyperic
B. Webmetrics
C. Univa UD
D. Tapinsystems
Answer» D. Tapinsystems
36.

Which of the following is used for Web performance management and load testing ?

A. VMware Hyperic
B. Webmetrics
C. Univa UD
D. Tapinsystems
Answer» C. Univa UD
37.

Which of the following is considered an essential element in cloud computing by CSA ?

A. Multi-tenancy
B. Identity and access management
C. Virtualization
D. All of the mentioned
Answer» B. Identity and access management
38.

Which of the following is operational domain of CSA ?

A. Scalability
B. Portability and interoperability
C. Flexibility
D. None of the mentioned
Answer» C. Flexibility
39.

Which of the following area of cloud computing is uniquely troublesome ?

A. Auditing
B. Data integrity
C. e-Discovery for legal compliance
D. All of the mentioned
Answer» E.
40.

Which of the following services that need to be negotiated in Service Level Agreements ?

A. Logging
B. Auditing
C. Regulatory compliance
D. All of the mentioned
Answer» E.
41.

Which of the following service provider provides the least amount of built in security ?

A. SaaS
B. PaaS
C. IaaS
D. All of the mentioned
Answer» D. All of the mentioned
42.

Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons ?

A. CloudWatch
B. CloudSensor
C. CloudMetrics
D. All of the mentioned
Answer» C. CloudMetrics
43.

Which of the following is a workflow control and policy based automation service by CA ?

A. CA Cloud Optimize
B. CA Cloud Orchestrate
C. CA Cloud Insight
D. CA Cloud Compose
Answer» C. CA Cloud Insight
44.

Which of the following is open and both hypervisor and processor-architecture-agnostic ?

A. Dell Scalent
B. CloudKick
C. Elastra
D. All of the mentioned
Answer» B. CloudKick
45.

Which of the following initiative tries to provide a way of measuring cloud computing services along dimension like cost ?

A. CCE
B. OCCI
C. SMI
D. All of the mentioned
Answer» D. All of the mentioned
46.

Which of the following is an industry organization that develops industry system management standards for platform interoperability ?

A. DMTF
B. DMS
C. EBS
D. All of the mentioned
Answer» B. DMS
47.

Which of the following is a core management feature offered by most cloud management service products ?

A. Support of different cloud types
B. Creation and provisioning of different types of cloud resources, such as machine instances, storage, or staged applications
C. Performance reporting including availability and uptime, response time, resource quota usage, and other characteristics
D. All of the mentioned
Answer» E.
48.

Which of the following is used for performance management for virtualized Java Apps with VMware integration ?

A. Hyperic
B. Internetseer
C. RightScale
D. All of the mentioned
Answer» B. Internetseer
49.

Which of the following is used for Web site monitoring and analytics ?

A. Gomez
B. Ganglia
C. Elastra
D. None of the mentioned
Answer» B. Ganglia
50.

Which of the following is a virtualization provisioning system that will be rolled into Dell’s AIM ?

A. Dell Scalent
B. CloudKick
C. Elastra
D. All of the mentioned
Answer» B. CloudKick