This set of Cloud Computing Multiple Choice Questions & Answers (MCQs) focuses on “Identity Protocol Standards”.
1. Which of the following is done by Identity management?
a) controlling access to data in the cloud
b) maintaining user roles
c) preventing unauthorized uses
d) all of the mentioned
View Answer
Explanation: Identity management is a primary mechanism for controlling access to data in the cloud, preventing unauthorized uses, maintaining user roles, and complying with regulations.
2. Point out the correct statement.
a) Identities are not tied to the concept of accounts and can be used for contacts or “ID cards”
b) Identities are important from a reliability standpoint
c) Presence is important in cloud computing because it adds context that can modify services and service delivery
d) All of the mentioned
View Answer
Explanation: Identities can be used to authenticate client requests for services in a distributed network system.
3. Which of the following is required by Cloud Computing?
a) That you establish an identity
b) That the identity be authenticated
c) That the authentication be portable
d) All of the mentioned
View Answer
Explanation: When applied to a number of users in a cloud computing system, these requirements describe systems that must provision identities.
4. Which of the following standard is the key to creating Single Sign-On (SSO) systems?
a) OpenID 2.0
b) CHAP
c) SMAL
d) None of the mentioned
View Answer
Explanation: Some cloud service providers have adopted OpenID as a service.
5. Point out the wrong statement.
a) OpenID 2.0 is the standard associated with creating an identity
b) OpenID doesn’t specify the means for authentication of identity
c) OpenID provides access to important Web sites
d) None of the mentioned
View Answer
Explanation: Authentication can be by a Challenge and Response Protocol (CHAP).
6. Which of the following is a complementary mechanism to OpenID and is used to create SSO systems?
a) OpenSSL
b) CHAP
c) SMAL
d) None of the mentioned
View Answer
Explanation: Taken as a unit, OpenID and SAML are being positioned to be the standard authentication mechanism for clients accessing cloud services.
7. Which of the following entity queries the OpenID identity provider to authenticate the veracity of the OpenID credentials?
a) serving party
b) relieving party
c) relaying party
d) none of the mentioned
View Answer
Explanation: The OpenID is presented to a service that provides access to the resource that is desired.
8. Which of the following provides a token service that can be used to present validated access to resources?
a) OAuth
b) OCheck
c) SAML
d) None of the mentioned
View Answer
Explanation: OAuth is similar to OpenID.
9. Which of the following foundation offers .NET developers Visual Studio integration of WS-Federation and WS-Trust open standards?
a) Windows Workflow
b) Windows Identity
c) Windows compliance
d) None of the mentioned
View Answer
Explanation: ASP.NET Web applications created with WIF integrate the Windows Communication Foundation SOAP service (WCF-SOAP) into a unified object model.
10. __________ allows users to authenticate their access to applications both locally and in the cloud with a claims-based identity.
a) AD FS
b) AC
c) SAS
d) None of the mentioned
View Answer
Explanation: AD FS uses WS-Federation, WS-Trust, and SAML, which allows users to access a system based on IBM, Novel, SAP, and many other vendors.
Sanfoundry Global Education & Learning Series – Cloud Computing.
Here’s the list of Best Books in Cloud Computing.
To practice all areas of Cloud Computing, Here is complete set of 1000+ Multiple Choice Questions and Answers.
- Check Computer Science Books
- Apply for Computer Science Internship
- Practice Information Science MCQs
- Check Cloud Computing Books
- Practice Computer Science MCQs