Multiple choice Questions and Answers on IDaaS of Cloud Computing for Freshers
1. Salesforce.com is the largest ______ provider of CRM software. a) PaaS b) IaaS c) CaaS d) SaaS Answer: d Explanation: Salesforce....

a) PaaS
b) IaaS
c) CaaS
d) SaaS
Explanation: Salesforce.com extended its SaaS offering to allow developers to create add-on applications.
a) Mashups are an incredibly useful hybrid Web application
b) SaaS will eventually replace all locally installed software
c) The establishment and proof of an identity is a central network function
d) All of the mentioned
Explanation: An identity service is one that stores the information associated with a digital entity in a form that can be queried and managed for use in electronic transactions.
a) Open Alliance Apache
b) Open Mashup Alliance
c) Open Tech Alliance
d) None of the mentioned
Explanation: This group predicts that the use of mashups will grow by a factor of 10 within just a few years.
a) identity
b) digital identity
c) mashup
d) all of the mentioned
Explanation: A digital identity is those attributes and metadata of an object along with a set of relationships with other objects that makes an object identifiable.
a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems
b) Services that provide digital identity management as a service have been part of internetworked systems from Day One
c) IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses
d) None of the mentioned
Explanation: The name servers that run the various Internet domains are IDaaS servers.
a) SSO
b) Singlefactor
c) Multi Factor
d) All of the mentioned
Explanation: More secure authentication requires the use of at least two-factor authentication.
a) Internet Hardware Addresses
b) Ethernet Software Addresses
c) Ethernet Hardware Addresses
d) None of the mentioned
Explanation: Network interfaces are identified uniquely by Media Access Control (MAC) addresses, which alternatively are referred to as Ethernet Hardware Addresses.
a) Multi-Factor Authentication
b) Fault tolerance
c) Identity protection
d) All of the mentioned
Explanation: Ticket or token providing services, certificate servers, and other trust mechanisms all provide identity services that can be pushed out of private networks and into the cloud.
a) Identity governance
b) Provisioning
c) Risk and event monitoring
d) All of the mentioned
Explanation: Identity as a Service or the related hosted (managed) identity services may be the most valuable and cost effective distributed service types you can subscribe to.
Explanation: Cloud computing IDaaS applications must rely on a set of developing industry standards to provide interoperability.
a) OpenID
b) OpenUser
c) OpenSSD
d) None of the mentioned
Explanation: When an identity is created in an OpenID system, that information is stored in the system of any OpenID service provider and translated into a unique identifier.
a) XML checks the ID request against its policies and either allows or denies the request
b) SPML in most instances operates as a reply/request mechanism
c) User centric authentication takes place usually in the form of knowledge cards
d) All of the mentioned
Explanation: In SAML, a service provider passes a statement or set of statements (called assertions) to an identity provider that must be evaluated.
a) XACML
b) XML
c) SOAP
d) None of the mentioned
Explanation: This is a general-purpose authorization policy language.
a) XACML
b) SPML
c) SML
d) All of the mentioned
Explanation: SPML is an XML request/response language that is used to integrate and interoperate service provisioning requests.
a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems
b) The Distributed Audit Service provides accountability for users accessing a system
c) The OpenID and CardSpace specifications support authentication type of data object
d) None of the mentioned
Explanation: OpenID is a developing industry standard for authenticating “end users” by storing their digital identity in a common format.
a) IGK
b) IDF
c) IGF
d) All of the mentioned
Explanation: The Identity Governance Framework (IGF) is a standards initiative of the Liberty Alliance.
a) IHA
b) EHA
c) CardSpace
d) None of the mentioned
Explanation: CardSpace was introduced with .NET Frameworks 3.0 and can be installed on Windows XP, Server 2003, and later.
a) Higgins
b) Hughes
c) Hinges
d) All of the mentioned
Explanation: The Higgins Open Source Identity Framework uses an i-Card metaphor.
a) eXtensible Access Control Markup Language
b) intrinsic Access Control Markup Language
c) hypertext Access Control Markup Language
d) all of the mentioned
Explanation: A policy in XACML describes a subject element that requests an action from a resource.
Explanation: SAML integrates with XACML to implement a policy engine in a Service Oriented Architecture to support identity services authorization.