InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What According To You Is The Importance Of Cloud Identity Management ? |
|
Answer» The overall cyber attacks and PRIVACY have become a major concern for the organizations. Identity management and access SIMPLY make sure that only the authorized person can access the DATA on the cloud and can manage the same. This often enhances the privacy and the security on a cloud environment and enable a business to simply keep up the pace all the TIME. Cloud identity management avoids the chances of data leak by imposing various RESTRICTIONS on the same. The overall cyber attacks and privacy have become a major concern for the organizations. Identity management and access simply make sure that only the authorized person can access the data on the cloud and can manage the same. This often enhances the privacy and the security on a cloud environment and enable a business to simply keep up the pace all the time. Cloud identity management avoids the chances of data leak by imposing various restrictions on the same. |
|
| 2. |
What Sort Of Investments Is Required In Cloud Architecture? |
|
Answer» The investments are almost NIL than in CASE one needs a dedicated cloud. It is very much true that the cloud TECHNOLOGY is secure and safe in every aspect as it simply makes sure of the just in TIME infrastructure. The investments are almost nil than in case one needs a dedicated cloud. It is very much true that the cloud technology is secure and safe in every aspect as it simply makes sure of the just in time infrastructure. |
|
| 3. |
If Dealing With A J2ee Application, What App Server Would You Deploy? Why Websphere Over Tomcat? |
|
Answer» WebSphere is app server and TOMCAT is web server. So Websphere is preferred if you want to run DISTRIBUTED transactions and ejb. Tomcat is GOOD enough if you provide merely http PROTOCOL level service alone. WebSphere is app server and tomcat is web server. So Websphere is preferred if you want to run distributed transactions and ejb. Tomcat is good enough if you provide merely http protocol level service alone. |
|
| 4. |
What Are Some Of The Steps To Validate The Performance Of Build ? |
|
Answer» Load TESTING for 20% more users than projected is a good STARTING PLACE. Load testing for 20% more users than projected is a good starting place. |
|
| 5. |
Name The Different Components Which Are Useful In Cloud Architecture? |
|
Answer» The first thing that matters is the SPEED of the processor. Next are Cloud INGRESS and the Intra-cloud communications. Moreover, the effective Cloud Provided Services and the storage services are ALSO MANDATORY. The first thing that matters is the speed of the processor. Next are Cloud Ingress and the Intra-cloud communications. Moreover, the effective Cloud Provided Services and the storage services are also mandatory. |
|
| 6. |
How The Need Of Writing The Complex Programs, Again And Again, Can Be Eliminated In The Cloud? |
|
Answer» This can be DONE with the HELP of Application PROGRAMMING Interface. All the instructions that govern the control over the application communication are defined by it and NEW SYSTEMS can be added to the cloud without changing the existing security policies binding identification and access management This can be done with the help of Application Programming Interface. All the instructions that govern the control over the application communication are defined by it and new systems can be added to the cloud without changing the existing security policies binding identification and access management |
|
| 7. |
While Managing The Identities, Give One Approach Which You Can Consider To Make Your Cloud More Intelligent? |
|
Answer» This can be done by simply providing the integrators the KNOWLEDGE about the DATA center and the CREATION of the same. This can be done by simply providing the integrators the knowledge about the data center and the creation of the same. |
|
| 8. |
While Transporting The Data Within A Cloud, Give One Method You Use To Secure It? |
|
Answer» Attention should be paid on the encryption KEY and MAKE SURE the same is IMPLEMENTED along with the files or the data Attention should be paid on the encryption key and make sure the same is implemented along with the files or the data |
|
| 9. |
Can You Tell How Cloud Computing Is Different From Mobile Computing ? |
|
Answer» They seem QUITE similar to one another but are actually different. Both use the same concept and Cloud COMPUTING has ADDITIONAL benefits. It becomes data operational through the World Wide Web than just a specific device. The data which is demanded by the USERS can be accessed anytime. On the other side, all the application in MOBILE generally runs on a remote server. Thus, the users can have access for storing, as well as managing the data. They seem quite similar to one another but are actually different. Both use the same concept and Cloud computing has additional benefits. It becomes data operational through the World Wide Web than just a specific device. The data which is demanded by the users can be accessed anytime. On the other side, all the application in mobile generally runs on a remote server. Thus, the users can have access for storing, as well as managing the data. |
|
| 10. |
Is It Possible To Manage The Identities In The Utility Computing? |
|
Answer» YES, this is POSSIBLE and because it is a plug-in management, the nature of SERVICES could be different. In most of the CASES, it is a Hybrid approach and identity management is not a big DEAL through an effective solution Yes, this is possible and because it is a plug-in management, the nature of services could be different. In most of the cases, it is a Hybrid approach and identity management is not a big deal through an effective solution |
|
| 11. |
Name The Different Components Which Are Useful In Cloud Architecture ? |
|
Answer» The FIRST thing that matters is the speed of the PROCESSOR. Next are Cloud Ingress and the Intra-cloud COMMUNICATIONS. Moreover, the effective Cloud Provided Services and the storage services are ALSO mandatory. The first thing that matters is the speed of the processor. Next are Cloud Ingress and the Intra-cloud communications. Moreover, the effective Cloud Provided Services and the storage services are also mandatory. |
|
| 12. |
Name Any Two Basic Clouds In The Cloud Computing Approach ? |
|
Answer» These are PROFESSIONAL and PERFORMANCE CLOUD These are Professional and Performance Cloud |
|
| 13. |
When Writing Code, How Do You Handle Multi-threading ? |
|
Answer» FIRST of all, if you are planning to have a LOT of receivers, I would not use the ONE-THREAD-AND-QUEUE-PER-RECEIVER approach. You could end up with a lot of threads not doing anything most of the TIME and I could hurt you performance wide. An alternative is using a thread pool of worker threads, just picking tasks from a shared queue, each task with its own receiver ID, and perhaps, a shared dictionary with socket connections to each receiver for the working threads to use First of all, if you are planning to have a lot of receivers, I would not use the ONE-THREAD-AND-QUEUE-PER-RECEIVER approach. You could end up with a lot of threads not doing anything most of the time and I could hurt you performance wide. An alternative is using a thread pool of worker threads, just picking tasks from a shared queue, each task with its own receiver ID, and perhaps, a shared dictionary with socket connections to each receiver for the working threads to use |
|
| 14. |
In 30 Seconds, If You Step Into A Project Where Development Has Been Done, How Do Your Review Existing Code ? |
|
Answer» ONE of the best ways is to review the unit test cases used during DEVELOPMENT . ALSO if you run each of the use cases in debugger mode of the IDE it will give me a better picture when a particular METHOD is invoked One of the best ways is to review the unit test cases used during development . Also if you run each of the use cases in debugger mode of the IDE it will give me a better picture when a particular method is invoked |
|
| 15. |
What Are Some Of The Steps To Validate Performance Of Build ? |
|
Answer» LOAD TESTING for 20% more users than PROJECTED is good starting place. Load testing for 20% more users than projected is good starting place. |
|
| 16. |
What Type Of Web Services Are You Working On? Did You Build Custom Interfaces To Go With Them ? |
|
Answer» Working on using XML based WEBSERVICES to connect with OAM as the native interfaces do not play well with custom legacy application. In the past used and JMS with CORBA interface to connect with legacy mainframe application Working on using XML based webservices to connect with OAM as the native interfaces do not play well with custom legacy application. In the past used and JMS with CORBA interface to connect with legacy mainframe application |
|
| 17. |
If Dealing With A J2ee Application, What App Server Would You Deploy? Why Websphere Over Tomcat ? |
|
Answer» WEBSPHERE is app SERVER and tomcat is webserver. So Websphere is preferred if you WANT to run distributed transactions and ejb. Tomcat is good enough if you PROVIDE merely HTTP prototcol level service alone WebSphere is app server and tomcat is webserver. So Websphere is preferred if you want to run distributed transactions and ejb. Tomcat is good enough if you provide merely http prototcol level service alone |
|
| 18. |
Name The Different Components Which Are Useful In The Cloud Architecture ? |
|
Answer» The FIRST thing that MATTERS is the speed of the processor. Next are Cloud Ingress and the Intra-cloud communications. Moreover, the effective Cloud PROVIDED Services and the storage services are ALSO mandatory. The first thing that matters is the speed of the processor. Next are Cloud Ingress and the Intra-cloud communications. Moreover, the effective Cloud Provided Services and the storage services are also mandatory. |
|
| 19. |
What Is The Significance Of Elasticity And The Scalability In Cloud Identity Management ? |
|
Answer» ELASTICITY is useful for the commissioning of the apps and the reverse action of the same which is quite useful in the identity management. On the other side, the Scalability is a characteristic that MAKES SURE that the extra WORKLOAD could be managed by boosting the resource capacity. Both are useful in managing the IDENTITIES and cut down the chances of so many errors. Elasticity is useful for the commissioning of the apps and the reverse action of the same which is quite useful in the identity management. On the other side, the Scalability is a characteristic that makes sure that the extra workload could be managed by boosting the resource capacity. Both are useful in managing the identities and cut down the chances of so many errors. |
|
| 20. |
What Sort Of Investments Is Required In Cloud Architecture ? |
|
Answer» The investments are almost NIL than in case one needs a dedicated cloud. It is very MUCH true that the cloud technology is secure and safe in EVERY ASPECT as it simply make sure of the just in TIME infrastructure. The investments are almost nil than in case one needs a dedicated cloud. It is very much true that the cloud technology is secure and safe in every aspect as it simply make sure of the just in time infrastructure. |
|
| 21. |
Define Cloud Service In Your Own Language ? |
|
Answer» Cloud is basically an approach to build and store cloud applications with the help of a server in a network with the help of internet. It offers the ABILITY to the users to access the application within a cloud from any location. In addition to this, all the APPS can be placed at a CENTRALIZED location where ONE needs not to worry about the SAFETY and the security of the concerned data. Cloud is basically an approach to build and store cloud applications with the help of a server in a network with the help of internet. It offers the ability to the users to access the application within a cloud from any location. In addition to this, all the apps can be placed at a centralized location where one needs not to worry about the safety and the security of the concerned data. |
|
| 22. |
Name Any Two Data Centers Which Are Common In The Cloud Environment ? |
|
Answer» These are Containerized DATA CENTERS and the low-density data centers These are Containerized data centers and the low-density data centers |
|
| 23. |
How The Need Of Writing The Complex Programs Again And Again Can Be Eliminated In The Cloud? |
|
Answer» This can be done with the help of APPLICATION PROGRAMMING Interface. All the instructions that govern the control over the application communication are defined by it and new systems can be added to the cloud without CHANGING the existing security policies binding identification and access MANAGEMENT This can be done with the help of Application Programming Interface. All the instructions that govern the control over the application communication are defined by it and new systems can be added to the cloud without changing the existing security policies binding identification and access management |
|
| 24. |
Is The Identity Management Same In Traditional Datacenters And In The Cloud Environment? |
|
Answer» No, it is actually not the same and there are a LOT of differences. There are a lot of software as well as the hardware issues in the TRADITIONAL datacenters and the fact is they all need to be secured in terms of identity management through PROTOCOLS and APPROACHES that largely varies. They need to have solutions which FOCUS more on the maintenance while when it comes to cloud; the same is not an issue during the cloud management. No, it is actually not the same and there are a lot of differences. There are a lot of software as well as the hardware issues in the traditional datacenters and the fact is they all need to be secured in terms of identity management through protocols and approaches that largely varies. They need to have solutions which focus more on the maintenance while when it comes to cloud; the same is not an issue during the cloud management. |
|
| 25. |
Is The Identity Management Same In Traditional Datacenters And In The Cloud Environment ? |
|
Answer» No, it is actually not the same and there are a LOT of DIFFERENCES. There are a lot of software as well as the HARDWARE issues in the TRADITIONAL datacenters and the fact is they all need to be secured in terms of identity management through protocols and approaches that largely varies. They need to have solutions which focus more on the MAINTENANCE while when it comes to cloud; the same is not an issue during the cloud management. No, it is actually not the same and there are a lot of differences. There are a lot of software as well as the hardware issues in the traditional datacenters and the fact is they all need to be secured in terms of identity management through protocols and approaches that largely varies. They need to have solutions which focus more on the maintenance while when it comes to cloud; the same is not an issue during the cloud management. |
|
| 26. |
What Exactly Do You Know About The Security Laws That Would Be Implemented For The Purpose Of Securing The Data In A Cloud Environment ?securing The Data In A Cloud Environment? |
|
Answer» The first thing is to make sure that the data is to be controlled and processed reliably in an APPLICATION. Next law is RELATED to file which simply make sure that it manages the ENTIRE data which is being manipulated. There are a few more LAWS such as Input Validation, OUTPUT Reconciliation as well as laws governing the security, as well as the backup of the network. The first thing is to make sure that the data is to be controlled and processed reliably in an application. Next law is related to file which simply make sure that it manages the entire data which is being manipulated. There are a few more laws such as Input Validation, Output Reconciliation as well as laws governing the security, as well as the backup of the network. |
|
| 27. |
Tell Something About The Basic Requirement You Need To Fulfill Before Implementing A Cloud Identity Management Solution ? |
|
Answer» The very first thing to pay ATTENTION to is nothing but the compliance which is MANDATORY. It is also necessary to pay attention to the loss of the data as WELL as the STORAGE. The experts must also pay attention to the overall continuity of the data integrity of the cloud environment. The very first thing to pay attention to is nothing but the compliance which is mandatory. It is also necessary to pay attention to the loss of the data as well as the storage. The experts must also pay attention to the overall continuity of the data integrity of the cloud environment. |
|
| 28. |
While Implementing The Cloud Security Policies And The Identity Management, What Would Be The Need Of Virtualization ? |
|
Answer» VIRTUALIZATION simply makes sure of the effective implementation of all the service level policies as WELL as the policies binding the Operating systems. In addition to this, virtualization is the APPROACH that is USEFUL in keeping the USER level concepts, as well as the backend level concepts different from one another. Virtualization simply makes sure of the effective implementation of all the service level policies as well as the policies binding the Operating systems. In addition to this, virtualization is the approach that is useful in keeping the user level concepts, as well as the backend level concepts different from one another. |
|
| 29. |
Suppose There Are Issues Related To The Performance, What Sort Of Actions You Will Take? |
|
Answer» The load, as well as the PERFORMANCE testing, is SOMETHING that WOULD be extremely helpful for you but this would be done in the initial stage. Code analyzing is the next thing that can be done for this. Moreover, the operation fortification and the upliftment can be done. ATTENTION is to be paid on the data files, disk space availability, as well as on the FACTORS that can enhance the downtime. The load, as well as the performance testing, is something that would be extremely helpful for you but this would be done in the initial stage. Code analyzing is the next thing that can be done for this. Moreover, the operation fortification and the upliftment can be done. Attention is to be paid on the data files, disk space availability, as well as on the factors that can enhance the downtime. |
|
| 30. |
Name One Approach Which You Can Consider For The Linking Of Programs To The Useful Systems ? |
|
Answer» This can be done with the help of an approach CALLED as EUCALYPTUS. It is also deployed for CLUSTERING in the cloud environment so that IDENTITIES can be managed on a COMPLEX network very easily. This can be done with the help of an approach called as EUCALYPTUS. It is also deployed for clustering in the cloud environment so that identities can be managed on a complex network very easily. |
|
| 31. |
While Managing The Identities, Give One Approach Which You Can Consider To Make Your Cloud More Intelligent ? |
|
Answer» This can be DONE by SIMPLY PROVIDING the integrators the knowledge about the data CENTER and the creation of the same. This can be done by simply providing the integrators the knowledge about the data center and the creation of the same. |
|
| 32. |
In The Cloud Environment, What Exactly Do You Mean By The Term System Integrators And How They Are Related To The Identity Management? |
|
Answer» One of the MAIN RESPONSIBILITIES of the system integrators is to provide the best strategy for the designing of the process which are COMPLICATED but are USEFUL in identity management. A strong network of private or a hybrid cloud with effective access management capabilities can be assured with the help of this approach. One of the main responsibilities of the system integrators is to provide the best strategy for the designing of the process which are complicated but are useful in identity management. A strong network of private or a hybrid cloud with effective access management capabilities can be assured with the help of this approach. |
|
| 33. |
Being A Cloud Identity Management Expert, Are You Familiar With The Different Layers In Cloud Architecture ? |
|
Answer» These are Walrnus, NODE CONTROLLER, CLUSTER Controller, CLOUD Controller and STORAGE Controller These are Walrnus, Node Controller, Cluster Controller, Cloud Controller and Storage Controller |
|
| 34. |
With A Cloud Identity Management Solution, What Are The Other Benefits You Can Have Than Just A Tool For Authorizing The Application Services ? |
|
Answer» In addition to authorizing the identities, a cloud identity MANAGEMENT solution can SIMPLY enable the organization to have a better access control. This makes sure of the permission management for handling the tasks on other’s behalf. Anyone entering a RESTRICTED section of a cloud can be controlled. In addition to this, the other benefits include the authorization, as well as the authentication so that a limited number of users can access the DATA. In addition to authorizing the identities, a cloud identity management solution can simply enable the organization to have a better access control. This makes sure of the permission management for handling the tasks on other’s behalf. Anyone entering a restricted section of a cloud can be controlled. In addition to this, the other benefits include the authorization, as well as the authentication so that a limited number of users can access the data. |
|
| 35. |
While Transporting The Data Within A Cloud, Give One Method You Use To Secure It ? |
|
Answer» Attention should be PAID on the encryption key and make SURE the same is implemented ALONG with the files or the data Attention should be paid on the encryption key and make sure the same is implemented along with the files or the data |
|
| 36. |
Is It Possible To Manage The Identities In The Utility Computing ? |
|
Answer» Yes, this is POSSIBLE and because it is a plug-in MANAGEMENT, the nature of SERVICES could be different. In most of the cases, it is a HYBRID approach and the identity management is not a big DEAL through an effective solution Yes, this is possible and because it is a plug-in management, the nature of services could be different. In most of the cases, it is a Hybrid approach and the identity management is not a big deal through an effective solution |
|
| 37. |
Can You Tell How Cloud Computing Is Different From The Mobile Computing ? |
|
Answer» They SEEM quite similar to ONE another but are actually different. Both use the same concept and the Cloud computing has additional benefits. It BECOMES data operational through World Wide Web than just a specific device. The data which is demanded by the users can be accessed anytime. On the other side, all the application in mobile generally RUNS on a remote server. Thus, the users can have access for storing , as well as managing the data. They seem quite similar to one another but are actually different. Both use the same concept and the Cloud computing has additional benefits. It becomes data operational through World Wide Web than just a specific device. The data which is demanded by the users can be accessed anytime. On the other side, all the application in mobile generally runs on a remote server. Thus, the users can have access for storing , as well as managing the data. |
|
| 38. |
Can You Name A Few Models In Cloud In Which The Sailpoint Solutions Can Be Applied Directly? |
|
Answer» The SAILPOINT is COMPATIBLE with all the models such as Private Clouds, Community cloud, Public Cloud, as well as the Hybrid cloud. However, its implementation and INSTALLATION COULD be DIFFERENT The Sailpoint is compatible with all the models such as Private Clouds, Community cloud, Public Cloud, as well as the Hybrid cloud. However, its implementation and installation could be different |
|
| 39. |
How The Sailpoint Cloud Identity Management Solution Could Be Useful Than Any Other Parallel Approach Or Solution ? |
|
Answer» Its data storage and backup is secure and organization can always make sure of the same It offers management ABILITIES without compromising with the server capabilities There are INBUILT sandboxing features which the users can simply make sure of without compromising with anything else It saves a LOT of cost, as well as EFFORTS of experts when it comes to managing the data on a CLOUD Its data storage and backup is secure and organization can always make sure of the same It offers management abilities without compromising with the server capabilities There are inbuilt sandboxing features which the users can simply make sure of without compromising with anything else It saves a lot of cost, as well as efforts of experts when it comes to managing the data on a cloud |
|
| 40. |
What Could Be The Influence Of An Effective Cloud Identity Management Solution On A Large Scale Organization With Complex Needs And Operation Handling ? |
|
Answer» There is nothing wrong to say that this APPROACH is very critical to any ORGANIZATION with complex needs and management solutions on a cloud. One of the BIGGEST factors is the overall productivity of the employees can be enhanced upto a great extent and without worrying about the overall cost associated. The technology at the same time can ALSO be improved. In case organizations have to face issues about the platform because of directory services, a cloud identity management solution with the neutral vendor can be very useful. There is nothing wrong to say that this approach is very critical to any organization with complex needs and management solutions on a cloud. One of the biggest factors is the overall productivity of the employees can be enhanced upto a great extent and without worrying about the overall cost associated. The technology at the same time can also be improved. In case organizations have to face issues about the platform because of directory services, a cloud identity management solution with the neutral vendor can be very useful. |
|
| 41. |
Give Abbreviation For Apmfa ? |
|
Answer» It STANDS for Application LEVEL multi factor AUTHENTICATION It stands for Application Level multi factor authentication |
|
| 42. |
What Are The Benefits That A Business Can Derive From An Effective Cloud Identity Management Solution According To You ? |
|
Answer» One of the best things is it can connect the employees to each other in a very secure MANNER and in fact without compromising with anything. All the IT applications an organization uses and the DEVICES they own can be made to communicate with each other with a central control or an eye on them. Probably this restricts the frauds and other problems. Organizations can simply enjoy the zero management overhead, as well as enhanced security. ALSO, the directory management can be done in a very reliable manner and without compromising with anything. In addition to this, all the CLOUD servers of an organization can be connected to the current AD. The same can also be extended upto a good extent. All the devices can be managed under one central control regardless of their location. One of the best things is it can connect the employees to each other in a very secure manner and in fact without compromising with anything. All the IT applications an organization uses and the devices they own can be made to communicate with each other with a central control or an eye on them. Probably this restricts the frauds and other problems. Organizations can simply enjoy the zero management overhead, as well as enhanced security. Also, the directory management can be done in a very reliable manner and without compromising with anything. In addition to this, all the cloud servers of an organization can be connected to the current AD. The same can also be extended upto a good extent. All the devices can be managed under one central control regardless of their location. |
|
| 43. |
Tell Any One Difference Among The Traditional Cloud Identity Management Solutions And The Sailpoint? |
|
Answer» The SailPoint focus more on the multi-protocol approach and it mainly focus on enabling any INFORMATION Technology resource to be considered simply. ONE of the key BENEFITS is it simply accept the default LANGUAGE of the tool or the program and simply MAKE sure of the favorable results in the shortest possible time. The SailPoint focus more on the multi-protocol approach and it mainly focus on enabling any Information Technology resource to be considered simply. One of the key benefits is it simply accept the default language of the tool or the program and simply make sure of the favorable results in the shortest possible time. |
|
| 44. |
Compare App Sso Solution With The Cloud Identity Management And Put Them Separate From One Another ? |
|
Answer» The Cloud IDENTITY management is more than just a simple app SSO solution. It provides BETTER PRIVACY and make SURE every user can have an individual access. It is also possible to restrict or limit the access in this approach. All the traditional systems can be made compatible with the cloud identity management and the good thing is it is based on Directory-as-a-service. Unlike SSO solutions, there is no concern in the CIM (Cloud Identity Management) when it comes to different devices and the Operating system. The Cloud Identity management is more than just a simple app SSO solution. It provides better privacy and make sure every user can have an individual access. It is also possible to restrict or limit the access in this approach. All the traditional systems can be made compatible with the cloud identity management and the good thing is it is based on Directory-as-a-service. Unlike SSO solutions, there is no concern in the CIM (Cloud Identity Management) when it comes to different devices and the Operating system. |
|
| 45. |
Define Cloud Identity Management In Your Own Words And Its Usefulness ? |
|
Answer» It is BASICALLY defined as the process of authorization and authentication on a cloud environment. It all started from the security of common applications and later TRANSFORMED to the entire cloud. One of the main aims of this approach is to make the cloud environment more and more visible to the organizations with COMPLEX and UNIQUE data STORAGE needs. It is basically defined as the process of authorization and authentication on a cloud environment. It all started from the security of common applications and later transformed to the entire cloud. One of the main aims of this approach is to make the cloud environment more and more visible to the organizations with complex and unique data storage needs. |
|
| 46. |
What According To You Is The Importance Of The Cloud Identity Management ? |
|
Answer» WELL, in the present SCENARIO, the overall cyber attacks and privacy has become a major concern for the organizations. Identity management and access simply make sure that only the AUTHORIZED person can access the data on the cloud and can manage the same. This often enhance the privacy and the security on a cloud ENVIRONMENT and enable business to simply keep up the pace all the time. Cloud identity management avoids the chances of data leak by IMPOSING various restrictions on the same. Well, in the present scenario, the overall cyber attacks and privacy has become a major concern for the organizations. Identity management and access simply make sure that only the authorized person can access the data on the cloud and can manage the same. This often enhance the privacy and the security on a cloud environment and enable business to simply keep up the pace all the time. Cloud identity management avoids the chances of data leak by imposing various restrictions on the same. |
|
| 47. |
Tell Something You Know About The Hypervisor Along With Its Types And Examples ? |
|
Answer» Is basically a VM monitor which manages the RESOURCES for a virtual machine in the cloud. They are of two TYPES. TYPE Task Examples Type 1 It runs directly over the host hardware VMWare, ESXI Type 2 It needs a host OS for running over a hardware Oracle Virtual Box Is basically a VM monitor which manages the resources for a virtual machine in the cloud. They are of two types. Type Task Examples Type 1 It runs directly over the host hardware VMWare, ESXI Type 2 It needs a host OS for running over a hardware Oracle Virtual Box |
|