Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

An ______ is a combination load balancer and application server that is a server placed between a firewall or router.

A. ABC
B. ACD
C. ADC
D. All of the mentioned
Answer» D. All of the mentioned
2.

Which of the following is a more sophisticated load balancer ?

A. workload managers
B. workspace managers
C. rackserve managers
D. all of the mentioned
Answer» B. workspace managers
3.

Which of the following network resources can be load balanced ?

A. Connections through intelligent switches
B. DNS
C. Storage resources
D. All of the mentioned
Answer» E.
4.

Which of the following software can be used to implement load balancing?

A. Apache mod_balancer
B. Apache mod_proxy_balancer
C. F6’s BigIP
D. All of the mentioned
Answer» C. F6’s BigIP
5.

The technology used to distribute service requests to resources is referred to as :

A. load performing
B. load scheduling
C. load balancing
D. all of the mentioned
Answer» D. all of the mentioned
6.

Which of the following type of virtualization is also characteristic of cloud computing ?

A. Storage
B. Application
C. CPU
D. All of the mentioned
Answer» E.
7.

_______ as a Service is a development environment that builds upon an existing cloud computing application infrastructure.

A. Software
B. Platform
C. Analytics
D. Compliance
Answer» C. Analytics
8.

_________ is used for merchant transactions under the Payment Card Industry Data Security Standard.

A. ClearPoint PCI
B. ClearSoln
C. Rackserve PCI
D. All of the mentioned
Answer» B. ClearSoln
9.

Which of the following is a PCI CaaS service ?

A. FedCloud
B. ClearSoln
C. Rackserve PCI
D. All of the mentioned
Answer» D. All of the mentioned
10.

________ as a Service is a hosted application that is the cloud equivalent of a traditional desktop application.

A. Software
B. Platform
C. Analytics
D. Compliance
Answer» B. Platform
11.

Which of the following can be used for banking industry ?

A. athenahealth
B. bankserve
C. bankingsol
D. all of the mentioned
Answer» C. bankingsol
12.

Which of the following is a man-in-the-middle type of service ?

A. CaaS
B. IaaS
C. AaaS
D. All of the mentioned
Answer» B. IaaS
13.

Which of the following is example of vertical cloud that advertise CaaS capabilities ?

A. FedCloud
B. ClearPoint PCI
C. Rackserve PCI
D. All of the mentioned
Answer» E.
14.

Which of the following is authorization markup language ?

A. eXtensible Access Control Markup Language
B. intrinsic Access Control Markup Language
C. hypertext Access Control Markup Language
D. all of the mentioned
Answer» B. intrinsic Access Control Markup Language
15.

The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service.

A. Higgins
B. Hughes
C. Hinges
D. All of the mentioned
Answer» B. Hughes
16.

_______ is a Microsoft software client that is part of the company’s Identity Metasystem and built into the Web Services Protocol Stack.

A. IHA
B. EHA
C. CardSpace
D. None of the mentioned
Answer» D. None of the mentioned
17.

Which of the following standard is concerned with the exchange and control of identity information ?

A. IGK
B. IDF
C. IGF
D. All of the mentioned
Answer» D. All of the mentioned
18.

_________ is a standard of OASIS’s PSTC that conforms to the SOA architecture.

A. XACML
B. SPML
C. SML
D. All of the mentioned
Answer» C. SML
19.

Which of the following allows a distributed ID system to write and enforce custom policy expressions ?

A. XACML
B. XML
C. SOAP
D. None of the mentioned
Answer» B. XML
20.

Any software application that complies with the standard accepts an _______ that is authenticated by a trusted provider.

A. OpenID
B. OpenUser
C. OpenSSD
D. None of the mentioned
Answer» B. OpenUser
21.

Which of the following is provided by Identity as a Service ?

A. Identity governance
B. Provisioning
C. Risk and event monitoring
D. All of the mentioned
Answer» E.
22.

_________ is one of the more expensive and complex areas of network computing.

A. Multi-Factor Authentication
B. Fault tolerance
C. Identity protection
D. All of the mentioned
Answer» D. All of the mentioned
23.

________ is assignment of a network identity to a specific MAC address that allows systems to be found on networks.

A. Internet Hardware Addresses
B. Ethernet Software Addresses
C. Ethernet Hardware Addresses
D. None of the mentioned
Answer» D. None of the mentioned
24.

__________ authentication requires the outside use of a network security or trust service

A. SSO
B. Singlefactor
C. Multi Factor
D. All of the mentioned
Answer» D. All of the mentioned
25.

Which of the following attribute should be unique ?

A. identity
B. digital identity
C. mashup
D. all of the mentioned
Answer» C. mashup
26.

Which of the following group is dedicated to support technologies that implement enterprise mashups ?

A. Open Alliance Apache
B. Open Mashup Alliance
C. Open Tech Alliance
D. None of the mentioned
Answer» C. Open Tech Alliance
27.

Salesforce.com is the largest ______ provider of CRM software.

A. PaaS
B. IaaS
C. CaaS
D. SaaS
Answer» E.
28.

The componentized nature of SaaS solutions enables many solutions to support a feature called :

A. workspace
B. workloads
C. mashups
D. all of the mentioned
Answer» D. all of the mentioned
29.

Open source software used in a SaaS is called _______ SaaS.

A. closed
B. free
C. open
D. all of the mentioned
Answer» D. all of the mentioned
30.

SaaS supports multiple users and provides a shared data model through _________ model.

A. single-tenancy
B. multi-tenancy
C. multiple-instance
D. all of the mentioned
Answer» C. multiple-instance
31.

_________ applications have a much lower barrier to entry than their locally installed competitors.

A. IaaS
B. CaaS
C. PaaS
D. None of the mentioned
Answer» E.
32.

Which of the following is a SaaS characteristic ?

A. The typical license is subscription-based or usage-based and is billed on a recurring basis
B. The software is available over the Internet globally through a browser on demand
C. The software and the service are monitored and maintained by the vendor
D. All of the mentioned
Answer» E.
33.

Which of the following SaaS platform is with an exposed API ?

A. salesforce.com
B. amazon.com
C. flipkart.com
D. all of the mentioned
Answer» B. amazon.com
34.

Which of the following aspect of the service is abstracted away ?

A. Data escrow
B. User Interaction
C. Adoption drivers
D. None of the mentioned
Answer» C. Adoption drivers
35.

Which of the following is most complete cloud computing service model ?

A. PaaS
B. IaaS
C. CaaS
D. SaaS
Answer» E.
36.

Rackspace Cloud Service is an example of :

A. IaaS
B. SaaS
C. PaaS
D. All of the mentioned
Answer» B. SaaS
37.

Amazon Web Services offers a classic Service Oriented Architecture (SOA) approach to :

A. IaaS
B. SaaS
C. PaaS
D. All of the mentioned
Answer» D. All of the mentioned
38.

_______ provides virtual machines, virtual storage, virtual infrastructure, and other hardware assets.

A. IaaS
B. SaaS
C. PaaS
D. All of the mentioned
Answer» B. SaaS
39.

__________ is the most refined and restrictive service model.

A. IaaS
B. CaaS
C. PaaS
D. All of the mentioned
Answer» D. All of the mentioned
40.

Which of the following can be considered PaaS offering ?

A. Google Maps
B. Gmail
C. Google Earth
D. All of the mentioned
Answer» B. Gmail
41.

_________ serves as a PaaS vendor within Google App Engine system.

A. Google
B. Amazon
C. Microsoft
D. All of the mentioned
Answer» B. Amazon
42.

Which of the following is associated with considerable vendor lock-in ?

A. PaaS
B. IaaS
C. CaaS
D. SaaS
Answer» B. IaaS
43.

______ offering provides the tools and development environment to deploy applications on another vendor’s application.

A. PaaS
B. IaaS
C. CaaS
D. All of the mentioned
Answer» C. CaaS
44.

Pods are aggregated into pools within an IaaS region or site called an _________ zone.

A. restricted
B. unavail
C. availability
D. none of the mentioned
Answer» D. none of the mentioned
45.

A group of users within a particular instance is called :

A. suser
B. pod
C. superuser
D. all of the mentioned
Answer» C. superuser
46.

Which of the following is management console in AWS ?

A. CSC
B. CCS
C. CSS
D. All of the mentioned
Answer» C. CSS
47.

_________ is designed specifically to run connected to the cloud as a dedicated cloud client.

A. Harvera Tablet OS
B. Fedora Netbook OS
C. Jolicloud Netbook OS
D. None of the mentioned
Answer» D. None of the mentioned
48.

Which of the following is classic example of an IaaS service model ?

A. AWS
B. Azure
C. Cloudera
D. All of the mentioned
Answer» B. Azure
49.

Which of the following is a a third-party VPN based on Google’s GoogleTalk ?

A. Hotspot VPN
B. Gbridge
C. AnchorFree Hotspot Shield
D. All of the mentioned
Answer» C. AnchorFree Hotspot Shield
50.

Which of the following is based on the IETF Session Initiation Protocol ?

A. WSDL
B. SIMPLE
C. SOAP
D. All of the mentioned
Answer» C. SOAP