Cloud Computing Multiple Choice Questions on “Identity Protocol Standards”.
1. Which of the following is done by Identity management?
a) controlling access to data in the cloud
b) maintaining user roles
c) preventing unauthorized uses
d) all of the mentioned
Answer: d
Clarification: Identity management is a primary mechanism for controlling access to data in the cloud, preventing unauthorized uses, maintaining user roles, and complying with regulations.
2. Point out the correct statement.
a) Identities are not tied to the concept of accounts and can be used for contacts or “ID cards”
b) Identities are important from a reliability standpoint
c) Presence is important in cloud computing because it adds context that can modify services and service delivery
d) All of the mentioned
Answer: c
Clarification: Identities can be used to authenticate client requests for services in a distributed network system.
3. Which of the following is required by Cloud Computing?
a) That you establish an identity
b) That the identity be authenticated
c) That the authentication be portable
d) All of the mentioned
Answer: d
Clarification: When applied to a number of users in a cloud computing system, these requirements describe systems that must provision identities.
4. Which of the following standard is the key to creating Single Sign-On (SSO) systems?
a) OpenID 2.0
b) CHAP
c) SMAL
d) None of the mentioned
Answer: a
Clarification: Some cloud service providers have adopted OpenID as a service.
5. Point out the wrong statement.
a) OpenID 2.0 is the standard associated with creating an identity
b) OpenID doesn’t specify the means for authentication of identity
c) OpenID provides access to important Web sites
d) None of the mentioned
Answer: d
Clarification: Authentication can be by a Challenge and Response Protocol (CHAP).
6. Which of the following is a complementary mechanism to OpenID and is used to create SSO systems?
a) OpenSSL
b) CHAP
c) SMAL
d) None of the mentioned
Answer: c
Clarification: Taken as a unit, OpenID and SAML are being positioned to be the standard authentication mechanism for clients accessing cloud services.
7. Which of the following entity queries the OpenID identity provider to authenticate the veracity of the OpenID credentials?
a) serving party
b) relieving party
c) relaying party
d) none of the mentioned
Answer: c
Clarification: The OpenID is presented to a service that provides access to the resource that is desired.
8. Which of the following provides a token service that can be used to present validated access to resources?
a) OAuth
b) OCheck
c) SAML
d) None of the mentioned
Answer: a
Clarification: OAuth is similar to OpenID.
9. Which of the following foundation offers .NET developers Visual Studio integration of WS-Federation and WS-Trust open standards?
a) Windows Workflow
b) Windows Identity
c) Windows compliance
d) None of the mentioned
Answer: b
Clarification: ASP.NET Web applications created with WIF integrate the Windows Communication Foundation SOAP service (WCF-SOAP) into a unified object model.
10. __________ allows users to authenticate their access to applications both locally and in the cloud with a claims-based identity.
a) AD FS
b) AC
c) SAS
d) None of the mentioned
Answer: a
Clarification: AD FS uses WS-Federation, WS-Trust, and SAML, which allows users to access a system based on IBM, Novel, SAP, and many other vendors.