Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

S90.18 Exam Questions Tutorials

Page: 4 / 4
Total 98 questions

Fundamental SOA Security Questions and Answers

Question 13

Which of the following approaches represents a valid means of utilizing generic security logic?

Options:

A.

When required, generic security logic can be embedded within a service. The close proximity to the service logic maximizes the chances that the security logic will be consistently executed without interference from attackers.

B.

When required, generic security logic can be abstracted into a separate utility service. This allows for reuse.

C.

When required, generic security logic can be abstracted into a service agent. This allows for reuse and the security logic can be executed in response to runtime events.

D.

All of the above.

Question 14

Security specialists are planning to implement public key cryptography in order to encrypt messages exchanged between Service A and Service B. Which of the following options fulfills this requirement?

Options:

A.

A shared key is used by both the services for message encryption and decryption

B.

The XML-Signature standard is applied

C.

The Data Origin Authentication pattern is applied

D.

None of the above

Page: 4 / 4
Total 98 questions